September 25, Programming YubiKeys for Okta Adaptive Multi-Factor Authentication
|
|
|
- Phoebe Cain
- 10 years ago
- Views:
Transcription
1 Programming YubiKeys for Okta Adaptive Multi-Factor Authentication September 25, 2015 Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 1 of 14
2 Copyright 2015 Yubico Inc. All rights reserved. Trademarks Yubico and YubiKey are trademarks of Yubico Inc. All other trademarks are the property of their respective owners. Disclaimer The contents of this document are subject to revision without notice due to continued progress in methodology, design, and manufacturing. Yubico shall have no liability for any error or damages of any kind resulting from the use of this document. The Yubico Software referenced in this document is licensed to you under the terms and conditions accompanying the software or as otherwise agreed between you or the company that you are representing. Contact Information Yubico Inc 420 Florence Street, Suite 200 Palo Alto, CA USA yubi.co/contact Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 2 of 14
3 Contents Introduction to the YubiKey... 4 Generating a YubiKey Secrets File... 5 Configuring the YubiKeys... 8 Programming Multiple YubiKeys YubiKey Configuration Protection Applying Protection at Configuration Applying Protection to Existing Configurations Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 3 of 14
4 Introduction to the YubiKey One key. Two form factors. The YubiKey delivers a one-time passcode (OTP) with a simple touch of a button. No SMS-like passcodes to retype from one device to another. Our YubiKey identifies itself as an external keyboard, which eliminates the need for client software or drivers. The nearly indestructible key holds tight onto its secrets, and its design ensures it will never be a vector for viruses or malware. When used with Okta, the YubiKey adds the strength of multi-factor authentication to protect accounts, eliminating the risk of a stolen password allowing malicious access to secured sites or services. Each YubiKey acts as two OTP devices in one body, allowing the same device to be used with both Okta as well as for a second service. With Yubico s YubiKey Personalization Tool, users or administrators can load their own secrets and configuration onto their YubiKey, ensuring that these secrets are never out of their control, and thereby limiting the risk of a breach compromising their security. For larger orders, Yubico also provides YubiKeys that are custom-configured for Okta for an additional fee. Contact Yubico Sales for more details. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 4 of 14
5 Generating a YubiKey Secrets File To generate a log containing the YubiKey secrets, for importing into the Okta service, the Yubico Cross-Platform Personalization tool is the simplest way to proceed. Download the YubiKey Personalization Tool installation files for Microsoft Windows, Mac OS X, or Linux from the Yubico download site. For the most secure configuration and loading of secrets, we recommend you install the tool on a secured (preferably air-gapped) computer. The YubiKey Personalization tool generates a file with all the secret information loaded onto the YubiKeys. Be sure keep a backup of this file in a secure location, ideally one that is not connected to a corporate network. The YubiKey Personalization tool can be configured to program multiple YubiKeys at a time, as well as for a single device. For instructions on setting up the YubiKey Personalization tool for multiple YubiKeys, see Programming Multiple YubiKeys. In addition, the YubiKeys can be locked with a Configuration Access code, preventing any modification to the setting or secrets loaded on the YubiKey if the code is not used. Steps to set up the Access code for configured YubiKeys are included in the chapter named YubiKey Configuration Protection. To generate the secrets file 1. To begin, download and install the Personalization tool on your system. 2. Once installed, insert a YubiKey into the USB port on your computer. 3. Launch the YubiKey Personalization tool. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 5 of 14
6 4. Click Update Settings. Tip: You can also click Settings in the top menu. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 6 of 14
7 5. To configure YubiKeys for Okta, change the following settings: a. Under General Settings, ensure the option to Use and enforce customer prefix is not selected. b. Under Logging Settings, select the check box for Log configuration output and then click the arrow to select Yubico Format. Settings are saved automatically as they are entered. The next step is to configure the YubiKey with the entered settings to generate the configuration file. Continue with the next section, Configuring the YubiKeys. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 7 of 14
8 Configuring the YubiKeys This section describes how to configure the YubiKeys using the Okta secrets file. To configure the YubiKeys 1. Launch the YubiKey Personalization Tool, if it is not already running. 2. Select Yubico OTP from the menu. 3. In the Program in Yubico OTP mode screen, click Advanced. 4. The first setting is for the Configuration Slot. Select the Configuration Slot to be programmed. Each YubiKey has two configuration slots, which can be selected by the length of time the user touches the button. A short touch (1~2 seconds) triggers reading from the first slot, while a longer touch, (3~5 seconds) triggers reading the second slot. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 8 of 14
9 By default, each YubiKey is configured for the YubiCloud in slot 1. If you plan to use your YubiKeys with additional services other than Okta, then you may want to configure slot 2 for Otka. However, if the YubiKeys are only to be used with the Okta service, overwriting the existing configuration in slot 1 will reduce confusion. 5. To configure multiple YubiKeys at the same time, select the box to Program Multiple YubiKeys. For make it easier to program the YubiKeys, also check the box to Automatically program YubiKeys when inserted and set the Parameter Generation Scheme to Identify from Serial; Randomize Secrets. (For more information on these options, see Programming Multiple YubiKeys.) 6. In the section under Configuration Protection, select the option for YubiKey(s) unprotected Enable protection. Then check the box under New Access Code to Use Serial Number. (For more information on these options, see YubiKey Configuration Protection.) 7. In the section under Yubico OTP Parameters, for Private Identity, click both Generate buttons to initialize the values for the Private Identity and Secret Key: The Public Identity should already be entered, in the field. The Pubic Identity is a string of 6 c s ( cc cc cc ) followed by 6 additional characters matching the Modhex value of the Serial number for the YubiKey. This value is also displayed in the right pane (status bar) in the YubiKey Personalization Tool in the status bar on the right of the tool. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 9 of 14
10 8. When you have configured all settings, click Write Configuration. The YubiKey Personalization tool displays a message so you can save a configuration_log.csv file this is the configuration secrets file you will need to import. 9. If you have set the tool to program multiple YubiKeys, it automatically programs each YubiKey after the previous one is removed and a new YubiKey is inserted. 10. When you have finished programming all YubiKeys, click Stop. Remove the last YubiKey, and you have completed programming the YubiKeys! Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 10 of 14
11 Programming Multiple YubiKeys When configuring large batches of YubiKeys, the YubiKey Personalization Tool can be configured to automate the process, generating unique secrets for each device while conforming to the settings entered by the user. The options for this function are in the section under Program Multiple YubiKeys. Program Multiple YubiKeys Select this option to enable the other options for automatically programming a batch of YubiKeys. If this option is not selected, each YubiKey will have to have a Public ID, Private ID, and AES key manually generated by the user. When selected, this option automates that process. Automatically Program YubiKeys when inserted When this option is enabled, the YubiKey Personalization Tool automatically programs a YubiKey as soon it registers the previous one was removed and a new key has been inserted. If this option is not selected, you need to click Write Configuration for each YubiKey being programmed. Parameter Generation Scheme This list allows you to define how you want the Public Identity, Private Identity, and AES key generated for each YubiKey. Increment Identity; Randomize Secrets This option has the Public ID for each YubiKey incremented by one from a base value (in modhex), with the Private ID and AES key randomly generated. Randomize all parameters This option randomizes the Public ID, Private ID, and AES key to randomly generated values. Identity from serial; Randomize Secrets This option sets the Public ID to be equal to the serial number of the YubiKey (in modhex), ensuring a unique Public ID for the device, with the Private ID and AES key randomly generated. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 11 of 14
12 YubiKey Configuration Protection Applying Protection at Configuration The YubiKey allows for the settings configured into either or both Configuration Slots to be locked down with an access code, so that only users who have the code can modify the settings on the YubiKey. Each slot can have this protection applied individually, allowing for the greatest amount of flexibility. The simplest way to protect your YubiKey is to use the YubiKey Personalization Tool and apply the Access code when configuring the slots on the YubiKey. To protect the configuration of your YubiKey 1. In the section under Configuration Protection, click the arrow to display the list of options: 2. Do one of the following. a. If the YubiKey slot you are configuring is not currently protected with an access code, select YubiKey(s) unprotected Enable protection. b. If the YubiKey slot you are configuring is currently protected with an access code, and you want to keep the current access code, select YubiKey(s) protected Keep it that way. c. If the YubiKey slot you are configuring is currently protected with an access code, and you want to set a new access code, select YubiKey(s) protected Change Access code. The Access Code fields become available, depending on the option you select. 3. Do one of the following: a. If Current Access code is available, enter the access code you currently use to secure the YubiKey. If you use the YubiKey Serial Number as an access code, select the option to automatically fill in the access code. b. If New Access code is available, enter the access code you want to use. The access code must be 12 characters (hexadecima 0-9, a-f). c. To use the YubiKey Serial Number as an access code, select Use Serial Number. An Access code created based off of the serial number is entered into the field. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 12 of 14
13 4. Click Write Configuration to write the configuration to the YubiKey. The status will be updated showing that the YubiKey configuration has been updated. If logging is enabled, the access code is recorded in the configuration_log.csv file. Applying Protection to Existing Configurations YubiKeys with firmware version 2.3 and above can have Configuration Protection applied (or removed) to existing configurations in either slot. Use the YubiKey Personalization Tool to apply Configuration Protection. To apply or remove configuration protections 1. Launch the Personalization tool, and select Update Settings. 2. Insert your YubiKey into the USB port, if it is not already inserted. 3. In the lower right corner of the Settings page, locate and click the button to Update Settings. 4. On the Update Settings page, select the slot from which you want to remove Configuration Protection. 5. On the Update Settings page, in the section under Configuration Protection, click the arrow to display the list of options: 6. Do one of the following. a. If the YubiKey slot you are configuring is not currently protected with an access code, select YubiKey(s) unprotected Enable protection. b. If the YubiKey slot you are configuring is currently protected with an access code, and you want to keep the current access code, select YubiKey(s) protected Keep it that way. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 13 of 14
14 c. If the YubiKey slot you are configuring is currently protected with an access code, and you want to set a new access code, select YubiKey(s) protected Change Access code. The Access Code fields become available, depending on the option you select. 7. Do one of the following: a. If Current Access code is available, enter the access code you currently use to secure the YubiKey. If you use the YubiKey Serial Number as an access code, select the option to automatically fill in the access code. b. If New Access code is available, enter the access code you want to use. The access code must be 12 characters (hexadecimal 0-9, a-f). c. To use the YubiKey Serial Number as an access code, select Use Serial Number. An Access code created based off of the serial number is entered into the field. 8. Click Update to write the configuration to the YubiKey. If logging is enabled, the access code is recorded in the configuration_log.csv file. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 14 of 14
Configuring a YubiKey for the YubiCloud
Configuring a YubiKey for the YubiCloud With the YubiKey Cross-Platform Personalization Tool April 9, 2013 Configuring a YubiKey for the YubiCloud 2012 Yubico. All rights reserved. Page 1 of 8 Introduction
VIP YubiKey Unlock Guide
VIP YubiKey Unlock Guide Unlocking the VIP YubiKey for YubiCloud OTP February 22, 2013 VIP YubiKey Unlock Guide 2012 Yubico. All rights reserved. Page 1 of 9 Introduction Yubico is the leading provider
NEO Manager Quick Start Guide
NEO Manager Quick Start Guide For the YubiKey NEO and NEO-n Version 1.1 November 19, 2014 NEO Manager Quick Start Guide 2014 Yubico. All rights reserved. Page 1 of 6 About Yubico Disclaimer As the inventors
YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015
YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,
NetMotion + YubiRADIUS Quick Start Guide
NetMotion + YubiRADIUS Quick Start Guide March 22, 2013 NetMotion + YubiRADIUS Quick Start Guide 2012 Yubico. All rights reserved. Page 1 of 7 Introduction Disclaimer Yubico is the leading provider of
YubiKey & OATH- TOTP Verification
YubiKey & OATH- TOTP Verification February 7, 2014 YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 1 of 11 Introduction Disclaimer Yubico is the leading provider of simple, open
Yubico Authenticator User's Guide
Yubico Authenticator User's Guide YubiKeys with desktop computers and NFCenabled Android smartphones Yubico Authenticator User's Guide 2016 Yubico. All rights reserved. Page 1 of 23 Copyright 2016 Yubico
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com
Yubico PIV Management Tools
Yubico PIV Management Tools Active Directory Smart Card Logon using the YubiKey NEO or NEO-n Document Version 1.0 April 15, 2015 Yubico PIV Management Tools 2015 Yubico. All rights reserved. Page 1 of
Yubico YubiHSM Monitor
Yubico YubiHSM Monitor Test utility for the YubiHSM Document Version: 1.1 May 24, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
YubiKey Authentication Module Design Guideline
YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company
YubiKey with Password Safe
Authentication concepts Author: Felicia King Authentication concepts Single-factor authentication Single-factor authentication is inherently flawed. Hackers and criminals install keystroke loggers, screen
YubiKey Integration for Full Disk Encryption
YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The
Quick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
Using GhostPorts Multi-Factor Authentication
Using GhostPorts Multi-Factor Authentication With CloudPassage Halo GhostPorts is a powerful multi-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans.
Multi-Factor Authentication for first time users
Multi-Factor Authentication for first time users **Multi-Factor Authentication will be required for all Duke University accounts on July 1 st, 2016.** What is Multi-Factor Authentication (MFA)?? Multi-factor
YubiKey PIV Deployment Guide
YubiKey PIV Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Deployment Guide 2016 Yubico. All rights reserved. Page 1 of 27 Copyright 2016
Getting Started With Halo for Windows For CloudPassage Halo
Getting Started With Halo for Windows For CloudPassage Halo Protecting your Windows servers in a public or private cloud has become much easier and more secure, now that CloudPassage Halo is available
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.
Security Token User Guide
TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 FUNCTIONS OF THE TOKEN... 3 1.2 SECURITY FEATURES OF THE TOKENS... 3 1.3 TOKEN INTERFACE... 3 1.4 VASCO TOKEN REPLACEMENT... 4 1.5 DEFINITIONS AND ACRONYMS...
YubiRADIUS Deployment Guide for corporate remote access. How to Guide
YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
MY WORLD GIS. Installation Instructions
MY WORLD GIS Version 4.1 Installation Instructions Copyright 2007 by Northwestern University. All rights reserved. Created August 15, 2002 Last Revised April 14, 2008 2. Launching the Installer On the
Cloud Backup Express
Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...
IMAP and SMTP Setup in Email Clients
IMAP and SMTP Setup in Email Clients Configuring an Email Client for IMAP Configuring an Email Client for the SMTP Server Overview Internet Message Access Protocol (IMAP), or a remote connection through
Entire Connection Version 4.2.1
Entire Connection Entire Connection is a software package that allows users to log on to FAMIS and download and print screens in FAMIS. Once logged on to FAMIS, see M08 for Entire Connection Download screens,
Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client
Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client June 2014 Table of Contents Introduction 1 Determine the Windows Operating System Version 2 Install the GlobalProtect VPN client
Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview
Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the
RSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.
Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they
A. I do not have my own personal certificate I am a new client or want to download a new certificate
This user guide will help you to create your personal certificate in file/browser or smart card certificate. If you already own a personal certificate in file that you have saved on your computer, you
DLP USB Scroll Control. Configuration Guide for QBox
DLP USB Scroll Control Configuration Guide for QBox Copyright information 2003-2014 Autocue Group Ltd. All rights reserved. All information about Autocue software, hardware and accessories including company
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
The following items are trademarks or registered trademarks of Kaba Mas in the United States and/or other countries. GITCON
The Gitcon Access Management Software Installation Guide is a publication of Kaba Mas LLC (hereinafter Kaba Mas). No part of this book may be reproduced or transmitted in any form or by any means, electronic
Online Backup and Recovery Manager Setup for Microsoft Windows.
Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the
Time Machine Setup for Routers
User Manual August 2015 202-11590-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on the label
Using TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
TX3 Series TELEPHONE ACCESS SYSTEMS. Configurator Quick Start. Version 2.2 Mircom Copyright 2014 LT-973
TX3 Series TELEPHONE ACCESS SYSTEMS Configurator Quick Start Version 2.2 Mircom Copyright 2014 LT-973 Copyright 2014 Mircom Inc. All rights reserved. Mircom Configurator Software Guide v.2.2 for Windows
Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of
FlashAir Configuration Software. User s Manual. (Windows) Revision 2
FlashAir Configuration Software User s Manual (Windows) Revision 2 1 FlashAir Configuration Software ( Software ) Support OS: Microsoft Windows XP SP3/ Windows Vista SP2 / Windows 7 (32bit/64bit) Software
Getting Started With Halo for Windows
Getting Started With Halo for Windows For CloudPassage Halo Protecting your Windows servers in a public or private cloud is much easier and more secure with CloudPassage Halo for Windows. Halo for Windows
Terminal Server Guide
Terminal Server Guide Contents What is Terminal Server?... 2 How to use Terminal Server... 2 Remote Desktop Connection Client... 2 Logging in... 3 Important Security Information... 4 Logging Out... 4 Closing
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
Remote Access Instructions
document rev. 8 updated 6/28/2012 Remote Access Instructions Table of Contents... Page 1 Finding the AFS Remote Access links and the AFS home page... 2 First time login with RSA fob (AFS option 1 SSL VPN
YubiCloud OTP Validation Service. Version 1.2
YubiCloud OTP Validation Service Version 1.2 5/12/2015 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely
Sophos SafeGuard Disk Encryption for Mac Startup guide
Startup guide Document date: January 2011 Content 1 Before you begin... 2 2 Protecting Mac OS X computers... 3 3 Technical support... 4 4 Copyright... 5 1 1 Before you begin 1.1 System requirements Hardware
RELEASE NOTES. Release Notes. Introduction. Platform. Product/version/build: Remote Control 11.00 (2012027) ActiveX Guest 11.
Release Notes Product/version/build: Remote Control 11.00 (2012027) ActiveX Guest 11.00 (2012027) Shipping date: RELEASE NOTES 30 th January 2012 Introduction These release notes contain information relating
Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA)
Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA) Table of Contents Introduction. 1 Determine your Windows Operating System (for software
How To Backup A Database In Navision
Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft
Enter your User Id and Password and click the Log In button to launch the application.
Working with CECAS How to Log In to CECAS Training Site In your internet browser, go to the following IP address: training.nccecas.org/cecas Enter your User Id and Password and click the Log In button
REMOTE ACCESS - OUTLOOK WEB APP
REMOTE ACCESS - OUTLOOK WEB APP Outlook Web App Outlook Web App (formally known as Outlook Web Access) offers basic e-mail, calendar and contact access. You will not be able to access any of your documents
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
SafeNet Authentication Client (Windows)
SafeNet Authentication Client (Windows) Version 8.1 SP1 Revision A User s Guide Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
System Firmware Update Instructions for AVH-4000NEX
System Firmware Update Instructions for AVH-4000NEX IMPORTANT Please download and print these firmware update instructions before downloading and installing the firmware update. It is important that you
Calisto Pro for Mac. User Guide Addendum
Calisto Pro for Mac User Guide Addendum Welcome This addendum to the Calisto Pro user guide contains instructions for setting up and using the Calisto system with your Macintosh computer. For general operation
MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS. e-filing Guide
MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS e-filing Guide 2012-2014 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in
Cash Management. Getting Started Guide
Cash Management Getting Started Guide Table of Contents Accessing Cash Management Online... 3 Multifactor Authentication... 3 Navigation... 5 Administration... 5 Manage Users... 6 User Activity Reports...
How to Schedule Report Execution and Mailing
SAP Business One How-To Guide PUBLIC How to Schedule Report Execution and Mailing Release Family 8.8 Applicable Releases: SAP Business One 8.81 PL10 and PL11 SAP Business One 8.82 PL01 and later All Countries
Imation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual
Imation Clip USB 2.0 Flash Drive Imation Drive Manager Software User s Manual Contents Introduction... 3 Features... 3 System Requirements... 4 Handling and Operating Recommendations... 4 Driver Installation...
PRN_LOAD 17.04.2002 16:22
PRN_LOAD.EXE is a user-friendly program for loading the HPR4915 with new firmware or fonts. It is based on the DOS operating system and also runs under WIN 95/89/NT WIN2000 WIN ME WIN XP and OS/2. However,
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the
Installing SQL Express. For CribMaster 9.2 and Later
Installing SQL Express For CribMaster 9.2 and Later CRIBMASTER USER GUIDE Installing SQL Express Document ID: CM9-031-03012012 Copyright CribMaster. 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
Java Remote Desktop. Java Remote Desktop. The Manual of Java Remote Desktop 1.12. J3PSoftware Revision 2.0 1
Java Remote Desktop The Manual of Java Remote Desktop 1.12 J3PSoftware Revision 2.0 1 1.I About Java Remote Desktop 1.II About this manual 2 Java Remote Desktop Versions 2.1 Java Remote Desktop 2.2 Java
Reason 8 Multi Licenses
MULTI LICENSES The information in this document is subject to change without notice and does not represent a commitment on the part of Propellerhead Software AB. The software described herein is subject
YubiCloud Validation Service. Version 1.1
YubiCloud Service Version 1.1 5/29/2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely combines
One-Time Password Contingency Access Process
Multi-Factor Authentication: One-Time Password Contingency Access Process Presenter: John Kotolski HRS Security Officer Topics Contingency Access Scenarios Requesting a Temporary One-Time Password Reporting
Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations
Getting Started Guide. Chapter 14 Customizing LibreOffice
Getting Started Guide Chapter 14 Customizing LibreOffice Copyright This document is Copyright 2010 2012 by its contributors as listed below. You may distribute it and/or modify it under the terms of either
Scanner Wedge for Windows Software User Guide
Scanner Wedge for Windows Software User Guide Contents INSTALLING THE SCANNER WEDGE SOFTWARE 2 ACTIVATING THE SCANNER CONNECTION 3 TRACING SCANNER OUTPUT 7 FORMATTING OUTPUT 9 SELECTING START-UP OPTIONS
Using GhostPorts Two-Factor Authentication
Using GhostPorts Two-Factor Authentication With CloudPassage Halo GhostPorts is a powerful two-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans. GhostPorts
FD40 User Guide. Version 16.0 June 2015
FD40 User Guide Version 16.0 June 2015 First Data Merchant Solutions is a trading name of First Data Europe Limited, a private limited company incorporated in England (company number 02012925) with a registered
MiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
1. Determine Your Current Software Version
1. Determine Your Current Software Version The procedure for upgrading your EAGLE to the version 2.2 software will depend upon the software version that is currently running on your EAGLE. To determine
1 Axis camera configuration... 2 1.1 IP configuration... 2 1.2 Setting up date and time... 4. 2 Installing an IPS Analytics Application...
Installation Instruction IPS Video Analytics for Axis ACAP Cameras and Encoders Contents 1 Axis camera configuration... 2 1.1 IP configuration... 2 1.2 Setting up date and time... 4 2 Installing an IPS
USER MANUAL DataLocker Enterprise
USER MANUAL DataLocker Enterprise ------------------------ March 2014 ------------------------ 1 Contents At a Glance Advanced 3 Introduction 17 Special features 5 About the Enterprise 19 Master admin
Configuring the WT-4 for ftp (Ad-hoc Mode)
En Configuring the WT-4 for ftp (Ad-hoc Mode) Mac OS X Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Mac OS X (10.5.2) ftp server for transmission
Guide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
COX BUSINESS ONLINE BACKUP
COX BUSINESS ONLINE BACKUP Quick start Guide www.cox.com Services and features not available in all areas and package options vary by market. Rates and speeds vary by market. Number of users and network
ILok Usage Guide. Version 7.3
ILok Usage Guide Version 7.3 Copyright 2007 Digidesign, a division of Avid Technology, Inc. All rights reserved. This guide may not be duplicated in whole or in part without the express written consent
Security Upgrade FAQs
Security Upgrade FAQs Your online security is important to us. Soon, we ll be upgrading your online banking experience to include a new security service, which is known in the online security industry
Identikey Server Getting Started Guide 3.1
Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
D&B SafeTransPort Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B
Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B Overview Overview Topics Covered overview, features and benefits Account activation and password maintenance Using the User
How To Use Excel 2010 On Windows 7 (Windows 7) On A Pc Or Mac) With A Microsoft Powerbook (Windows Xp) On Your Computer Or Macintosh (Windows) On Windows Xp (Windows 2007) On Microsoft Excel 2010
ISBN 978-1-921780-70-7 CREATE AND PRODUCE SPREADSHEETS BSBITU202A/BSBITU304A Excel 2010 Supporting BSBITU202A Create and Use Spreadsheets and BSBITU304A Produce Spreadsheets in the Business Services Training
Email client configuration guide. Business Email
Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server
USER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
Cloud Catcher TM Software
Cloud Catcher TM Software User Manual Version 2.0 Technical Support SanDisk Knowledgebase Contact SanDisk Table of Contents Overview... 2 Minimum System Requirements... 2 Languages Supported... 2 Installing
Net USER GUIDE MEDIA SHARING DEVICE
FCC DECLARATION OF CONFORMANCE This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this
Handle Tool. User Manual
User Manual Corporation for National Research Initiatives Version 2 November 2015 Table of Contents 1. Start the Handle Tool... 3 2. Default Window... 3 3. Console... 5 4. Authentication... 6 5. Lookup...
1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
SSD Guru. Installation and User Guide. Software Version 1.4
SSD Guru Installation and User Guide Software Version 1.4 Contents Welcome!............................................................................. 1 Key features.........................................................................
Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail
Solution domain Cloud PC Backup Startingkit for users Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail Table of contents Table of contents... 2 1. What is Cloud PC Backup?...
LockView 4.2 CompX Database & Network Configuration & Installation Manual
LockView 4.2 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements... 5
SELF-PACED POLLING WITH INSIGHT 360
Self-Paced Polling with Insight 360 1 SELF-PACED POLLING WITH INSIGHT 360 Plan Installing the Software 1 Turn on the classroom computer. 2 Select the DVD that is compatible with your computer s operating
NetSuite OpenAir Mobile for Android User Guide Version 1.3
NetSuite OpenAir Mobile for Android User Guide Version 3 General Notices Attributions NetSuite OpenAir includes functionality provided by HighCharts JS software, which is owned by and licensed through
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann
2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY Axel Hoffmann Biography Axel Hoffmann Linux System Administrator 1&1 Mail & Media Dev. & Tech. GmbH [email protected] 2 Introduction Requirements
YubiRADIUS Virtual Appliance. Configuration and Administration Guide Software version: 3.6.0 Document version: 1.0
YubiRADIUS Virtual Appliance Configuration and Administration Guide Software version: 3.6.0 Document version: 1.0 December 14, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open
HP ProtectTools. Getting Started
HP ProtectTools Getting Started Copyright 2012 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Intel is a trademark
