Secure Access Portal. Getting Started Guide for using the Secure Access Portal. August Information Services

Size: px
Start display at page:

Download "Secure Access Portal. Getting Started Guide for using the Secure Access Portal. August 2011. Information Services"

Transcription

1 Secure Access Portal Getting Started Guide for using the Secure Access Portal Information Services

2 1. Introduction The Secure Access Portal enables the authority to provide simple but secure remote access to internal applications and resources such as , Intranet and the Corporate Telephone Directory. It can be used by Members, employees, partners and contractors of the Council who have been provided with a Cryptocard authentication token. It provides the facility to connect to council applications and resources from any internet connected device subject to minimum security criteria which the portal checks for during the login process. 2. Accessing the System The system is accessed via On initial connection you are presented with a council-branded landing page from which you can choose from a couple of options regarding the type of machine you are currently using. The difference scenarios are: Corporate and Public, as shown below. On clicking any of these options a security policy is invoked and a mechanism called Host Checking takes place. This is how the security and integrity of the connecting PC or device is determined. A number of checks are performed, e.g. relating to the state of anti-virus protection installed on the user s machine. These options are intended for different access scenarios: The Corporate option is for authorised county-provided PCs and laptops. Secure Access Portal Getting Started Guide 2

3 The Public options are for any other computer (i.e. not managed by the authority). Examples are home PCs, computers provided by business partners, web cafés and airport kiosks. 3. Logging On The Portal uses two factor authentication when logging users on, which means that in order to successfully validate your identity you need to have a unique physical token as well as your usual username and password. The token is protected by a Personal Identification Number (PIN), and generates a unique one-time password each time you press the button. Full instructions on how to use the token are provided in a separate CRYPTOCard user guide. In summary, to logon using the token you first enter your PIN and then append the one-time passcode which is read from the token display. Also, note that when you provide your username it may need to be in full domain name format, that is, your usual username but prefixed by your domain name, e.g. cc\fbloggs. If you do not know your domain name then your line manager or the Service Desk will be able to help you, but as a rule of thumb: - If you are an employee then your domain name is likely to be cc - If you are a partner or customer then it will probably be partner. A typical logon screen, with the information required, is shown below: Your network user name in domain\username format Your usual network password 4 digit token PIN 7 digit token Passcode Your Portal session will timeout after a period of inactivity, after which you will need to logon again if you wish to continue working. This is for security reasons, in order to protect your session and data in case you forget to logoff or you leave your computer unattended. Secure Access Portal Getting Started Guide 3

4 4. Your Portal Home Page Once you have successfully logged on you will be presented with a home page. This is a customisable page which contains links to all of the applications you have been authorised to use. It can be personalised in various ways, and any changes you make will be remembered and used next time (even if you access it from a different computer). Some key areas of the Home page are illustrated below: Browse bar Enter the name of an internal resource (e.g. an intranet site) to browse directly to it Toolbar Quick links to the Home page, Preferences, Help and Sign Out Terminal Services or Virtual Desktop links Click links to start a Terminal Services or Shared Desktop session Web Bookmarks Any web resource you access can be bookmarked and added here for quick reference You can access any of the listed applications or resources by clicking the link. If you require access to an application or resource which is not listed then you will need to log a request with the IS Service Desk 5. Launching Web Applications The Web Bookmarks section contains your current list of bookmarks. You can add new bookmarks, or edit/remove existing ones. The Preferences option allows you to arrange the order in which your web bookmarks are displayed on the home page. Add a bookmark Preferences Collapse or expand the Web Bookmarks section Secure Access Portal Getting Started Guide 4

5 When you click on a Web Bookmark it will launch in a new window. You will see that web site or application just as you would if accessing it internally 6. Changing Your Preferences The home page toolbar and the web toolbar provide the option to change your preferences. From the Preferences page, the options are arranged into three tabs: User Home, General and Advanced: User Home preferences: The User Home tab contains the Panel Sorting options, which allows you to arrange the layout of the various sections of your home page. General preferences: The General preferences tab contains the Change Password page. Use this option to change your Windows password. Please note that this applies to your Windows network domain password, and is not related to your CRYPTOCard token. To change your CRYPTOCard token PIN number you should contact the IS Service Desk, as described in the CRYPTOCard Getting Started Guide. Advanced Preferences: The advanced preferences should normally not be required unless advised by the Service Desk. Secure Access Portal Getting Started Guide 5

6 Appendix A - How the Secure Access Portal Works The system makes use of the SSL technology that is built into all common web browsers, all transmitted data is automatically kept confidential by means of encryption. There is no need to pre-install clients on any machines that require access to the network. This method of connecting to the network is termed SSL Virtual Private Network (SSL VPN). Two other mechanisms are available to further protect data. The first is a cache cleaner which clears out history and other caches after a user exits the system. The second is a host checker which is automatically downloaded onto the machine and performs several security compliance checks in order to verify that the machine meets a baseline criteria for example the presence of Antivirus software is checked against a predetermined list as well as ensuring that it is up to date with on access scanning is enabled. Depending on the level of security required, the Secure Access Portal can be configured to automatically clean the cache and other residual information when you end the session. System Requirements The Secure Access Portal is accessible from any computer that has a web browser and an Internet connection, be that a Windows PC or an Apple MAC, or a web-enabled mobile device such as a smart phone. Cornwall Council recommends using Microsoft Windows 7 and Internet Explorer 8 or 9. Please note that whilst the system aims to support most major operating systems and web browsers the Google Chrome web browser is not supported and use of other web browsers and/or operating systems may reduce the features or functionality available in the portal. Secure Access Portal Getting Started Guide 6

7 Authorised users of the system need to be set up in advance, and must know their network username and password, and also will have been issued with a physical logon token (called a CRYPTOCard token). If you would like this information in another format please contact: IS Service Desk Cornwall Council County Hall Treyew Road Truro TR1 3AY Telephone: servicedesk@cornwall.gov.uk Secure Access Portal Getting Started Guide 7

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required

More information

Remote Access End User Reference Guide for SHC Portal Access

Remote Access End User Reference Guide for SHC Portal Access Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

SSL VPN Service. To get started using the NASA IV&V/WVU SSL VPN service, you must verify that you meet all required criteria specified here:

SSL VPN Service. To get started using the NASA IV&V/WVU SSL VPN service, you must verify that you meet all required criteria specified here: SSL VPN Service Note: This guide was written using Windows 7 with Internet Explorer 8. The same principles and techniques are applicable to new versions of Internet Explorer as well as Firefox. Any significant

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

These additional levels of security are NOT required if you are using a Derbyshire County Council machine on council premises.

These additional levels of security are NOT required if you are using a Derbyshire County Council machine on council premises. This guide is intended for Derbyshire County Council employees, partners and suppliers who need remote access to the Council s network. This would be primarily from locations not directly on Council property,

More information

Accessing TP SSL VPN

Accessing TP SSL VPN Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos

More information

Using Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet

Using Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet System Requirements These are the minimum requirements necessary to ensure the proper operation of Centegra Health System s Access.Centegra.Com. Administrative level access to the PC or other device used

More information

Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional

Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Information Services Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Amendment & Authorisation History Ver Date Changes Name Author A 29/3/05

More information

Allianz Global Investors Remote Access Guide

Allianz Global Investors Remote Access Guide Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page

More information

1. Accessing the LONZA network from a private PC or Internet Café

1. Accessing the LONZA network from a private PC or Internet Café Using SSL VPN from non Lonza PCs 1. Accessing the LONZA network from a private PC or Internet Café To work at home with your private PC or from an Internet Café, you can use your browser to connect to

More information

MetroHealth Information Services

MetroHealth Information Services METROHEALTH SSLVPN INSTALLATION INSTRUCTIONS REQUIREMENTS:... 2 VPN INSTALLATION... 3 OK, I M CONNECTED NOW WHAT DO I DO?... 5 Set up a connection to the Application Portal:... 5 Logging off the VPN Clinical

More information

Secure Global Desktop (SGD)

Secure Global Desktop (SGD) Secure Global Desktop (SGD) Table of Contents Checking your Java Version...3 Preparing Your Desktop Computer...3 Accessing SGD...5 Logging into SGD...6 Using SGD to Access Your Desktop...7 Using SGD to

More information

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106 UCLH VPN User Guide January 2009 VPN User Guide v1.3 20090106 1. What is the VPN? The VPN (Virtual Private Network) provides users with secure access, using a web browser, to a standard terminal screen

More information

UMMS SSL VPN Instructions

UMMS SSL VPN Instructions UMMS SSL VPN Instructions The document contains the following sections: 1. Introduction 2. Prerequisites 3. Supported software platforms 4. Browser configuration 5. Logon to the UMMS SSL VPN 6. Launching

More information

Setting Up and Accessing VPN

Setting Up and Accessing VPN Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication

More information

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Smart Phone App version Contents About this guide... 2 Before accessing Outlook Web Access... 3 Accessing Outlook Web Access (OWA)

More information

Accessing the Mercy Remote Access Portal (SSL VPN)

Accessing the Mercy Remote Access Portal (SSL VPN) MERCY INFORMATION SECURITY TEAM Accessing the Mercy Remote Access Portal (SSL VPN) In order to access the Sisters of Mercy Remote Access Portal, you will need to complete the following steps. ** Important:

More information

Install and End User Reference Guide for Direct Access to Citrix Applications

Install and End User Reference Guide for Direct Access to Citrix Applications Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a

More information

A) What do I do when I get a screen with an error message that reads: Logon with URL parameter not possible; logon cookie is missing?

A) What do I do when I get a screen with an error message that reads: Logon with URL parameter not possible; logon cookie is missing? A) What do I do when I get a screen with an error message that reads: Logon with URL parameter not possible; logon cookie is missing? Go to your Internet explorer then click Help About Internet explorer

More information

mystanwell.com Installing Citrix Client Software Information and Business Systems

mystanwell.com Installing Citrix Client Software Information and Business Systems mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.

More information

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID Implementation Guide for Juniper SSL VPN SSO with OWA with BlackShield ID Copyright 2009 CRYPTOCard Inc. http:// www.cryptocard.com Copyright Copyright 2009, CRYPTOCard All Rights Reserved. No part of

More information

Access to applications and the network depends on whether or not you are using personal equipment or a Firm-issued laptop or desktop.

Access to applications and the network depends on whether or not you are using personal equipment or a Firm-issued laptop or desktop. Overview of Help & Tips The new System allows authorized users to log in and access the Firm s network through either Citrix or VPN (also known as Stonegate IPSec VPN). This system incorporates additional

More information

Coillte IT has recently upgraded the Remote Access Solution to a new platform.

Coillte IT has recently upgraded the Remote Access Solution to a new platform. Overview Coillte IT has recently upgraded the Remote Access Solution to a new platform. This document explains how to gain access to the Coillte network using your home computer through the new Remote

More information

VRD for Windows User guide

VRD for Windows User guide VRD for Windows User guide es/15865771_3 Table of contents Item Headings Page 1. VRD - key points to note... 1 2. First time user to VRD... 2 3. Returning user to VRD... 2 4. Using VRD for Windows... 2

More information

VPN User Guide. For Mac

VPN User Guide. For Mac VPN User Guide For Mac System Requirements Operating System: Mac OSX. Internet Browser: Safari (Firefox and Google Chrome are NOT currently supported). Disclaimer Your computer must have the system requirements

More information

Remote Access Instructions

Remote Access Instructions document rev. 8 updated 6/28/2012 Remote Access Instructions Table of Contents... Page 1 Finding the AFS Remote Access links and the AFS home page... 2 First time login with RSA fob (AFS option 1 SSL VPN

More information

User Guide Remote PIV to VDI Using a PIV Card

User Guide Remote PIV to VDI Using a PIV Card User Guide Remote PIV to VDI Using a PIV Card Energy IT Services (IM-64) March 2015 Authors Prepared By Matthew Cummings Senior Systems Engineer IM-64 Version Control Date Version Document Revision Description

More information

EURECOM VPN SSL for students User s guide

EURECOM VPN SSL for students User s guide EURECOM VPN SSL for students User s guide Table of Contents Introduction... 2 Login process... 2 Portail main page... 2 Prerequisite... 2 RSA SecurId software token... 3 First usage of RSA SecurID token...

More information

User Guide Remote Access to VDI/Workplace Using PIV

User Guide Remote Access to VDI/Workplace Using PIV User Guide Remote Access to VDI/Workplace Using PIV Innovation & Engineering Office (IM-64) May 2015 Table of Contents 1 Overview... 3 1.1 Web Browsers... 3 1.2 Operating Systems... 3 2 Types of Smart

More information

Remote Access Portal (RAP) Installation and User Guide

Remote Access Portal (RAP) Installation and User Guide Remote Access Portal (RAP) Installation and User Guide W:\data02\Helpdesk\Procedures\RAP\RAP Installation Guide 2015.doc Page 1 of 12 1. Introduction 3 2. Support 3 3. Technical Requirements 4 4. First

More information

How to Remotely Access the C&CDHB Network from a Personal Device

How to Remotely Access the C&CDHB Network from a Personal Device How to Remotely Access the C&CDHB Network from a Personal Device 13/09/2012 Contents Installing the Citrix Receiver for Windows PCs... 2 Installing the Citrix Receiver for Mac OS X... 6 Installing the

More information

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

REMOTE ACCESS USER GUIDE

REMOTE ACCESS USER GUIDE REMOTE ACCESS USER GUIDE Document Released by the IT Department [21/11/2013] Content Summary 1. Remote Access User Guide Cover Page 2. Content Summary 3. Website/Portal Accessing 4. Method of Accessing

More information

Access to Webmail services via a Non Trust Computer

Access to Webmail services via a Non Trust Computer Access to Webmail services via a Non Trust Computer Aintree Outlook Web Access has been provided via the AppGate SSL Portal, this service can be accessed from any computer on the Internet. Two factor SMS

More information

How to Use Remote Access Using Internet Explorer

How to Use Remote Access Using Internet Explorer Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

Sophos UTM. Remote Access via IPsec Configuring Remote Client

Sophos UTM. Remote Access via IPsec Configuring Remote Client Sophos UTM Remote Access via IPsec Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without

More information

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information

How to use SURA in three simple steps:

How to use SURA in three simple steps: How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.

More information

Manufacturing Representative SSL VDM Login User s Guide

Manufacturing Representative SSL VDM Login User s Guide June 12 2008 Ver. 1.5 KEMET Corporation Manufacturing Representative SSL VDM Login User s Guide This document is a guide to assist a Manufacturing Representative (MFG REP) to connect and login to the SSL

More information

This document shows new Citrix users how to set up and log in to their Citrix account.

This document shows new Citrix users how to set up and log in to their Citrix account. Citrix Set up Set up and Log in to Citrix Objective: This document shows new Citrix users how to set up and log in to their Citrix account. Procedure This document shows you how to set up and log in to

More information

IMAP and SMTP Setup in Email Clients

IMAP and SMTP Setup in Email Clients IMAP and SMTP Setup in Email Clients Configuring an Email Client for IMAP Configuring an Email Client for the SMTP Server Overview Internet Message Access Protocol (IMAP), or a remote connection through

More information

Spectrum Health Virtual Desktop (VDI) (available only to select users at this time)

Spectrum Health Virtual Desktop (VDI) (available only to select users at this time) This page allows access to several Spectrum Health password protected areas. If you have any issues using these services, please contact the Spectrum Health Help Desk at 616.391.1361. Additional Security

More information

Basic User Guide for the IAS VPN (https://vpn.ias.edu)

Basic User Guide for the IAS VPN (https://vpn.ias.edu) Introduction...2 Getting Started...2 How To Login...2 Home Screen...3 IAS-wide...3 School of Natural Science...3 School of Historical Studies/School of Social Science (Supported by ITG)...3 School of Mathematics...3

More information

Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC

Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC Undergraduate Academic Affairs \ Student Affairs IT Services VPN and Remote Desktop Access from a Windows 7 PC Last edited: 4 December 2015 Contents Inform IT Staff... 1 Things to Note... 1 Setting Up

More information

...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...

...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0... TABLE OF CONTENTS...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...2 INSTALLING THE ENDPOINT ANALYSIS...4 LOGGING OFF

More information

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Mobile Phone SMS version

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Mobile Phone SMS version Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Mobile Phone SMS version Contents About this guide... 2 Before accessing Outlook Web Access (OWA)... 3 Accessing Outlook Web Access

More information

IMS Health Secure Outlook Web Access Portal. Quick Setup

IMS Health Secure Outlook Web Access Portal. Quick Setup IMS Health Secure Outlook Web Access Portal Purpose: This service has been developed to allow access to the IMS Health email system for staff that can not access the email system through VPN which is preferred

More information

VPN User Guide. For Mac

VPN User Guide. For Mac VPN User Guide For Mac System Requirements Operating System: Mac OSX. Internet Browser: Safari (Firefox and Google Chrome are NOT currently supported). Disclaimer Your computer must have the system requirements

More information

Akin Gump Strauss Hauer & Feld LLP Remote Access Resources

Akin Gump Strauss Hauer & Feld LLP Remote Access Resources Akin Gump Strauss Hauer & Feld LLP Remote Access Resources Firm Laptop Windows Home PC Mac Computer Apple ipad Android Devices Exit akingump.com 2013 Akin Gump Strauss Hauer & Feld LLP Checkpoint VPN (Firm

More information

Edith Cowan University Information Technology Services Centre

Edith Cowan University Information Technology Services Centre Information There are three wireless networks on campus which give you access to the ECU website, the staff intranet, the internet and other ECU resources: ECU This is the easiest to use and safest wireless

More information

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Wireless Setup for Windows 8

Wireless Setup for Windows 8 Wireless Setup for Windows 8 Wireless Names KUEMPLOYEE Only Kettering Staff and Faculty can connect to this wireless o Network Access, Internet Access, Printer Access, License Manager KUSTUDENT Active

More information

Using Remote Web Workplace Version 1.01

Using Remote Web Workplace Version 1.01 Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote

More information

Remote Desktop Web Access. Using Remote Desktop Web Access

Remote Desktop Web Access. Using Remote Desktop Web Access Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained

More information

SSL VPN Setup for Windows

SSL VPN Setup for Windows SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through

More information

MRU Secure Remote Access Service (SRAS) External User Guide

MRU Secure Remote Access Service (SRAS) External User Guide MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendors and external clients, restricted remote access to internal computing

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend

More information

City of Jacksonville 1 of 6 Start Here >> http://remote.coj.net

City of Jacksonville 1 of 6 Start Here >> http://remote.coj.net Citrix Remote Access allows employees to access all parts of the city s computer network from any PC with internet connectivity. Simply type the URL for Remote Access on any internet browser anywhere,

More information

Citrix Remote Access Work Instructions

Citrix Remote Access Work Instructions Work Instructions Version 1.0 15 January 2010 InTACT Shared Services Centre ACT Department of Treasury Quality Management System Service Management Tools Contents Introduction... 3 Purpose... 3 Scope...

More information

Citrix Remote Access Portal U s e r M a n u a l

Citrix Remote Access Portal U s e r M a n u a l Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting

More information

Remote VPN: Remote access for personal devices

Remote VPN: Remote access for personal devices Remote VPN: Remote access for personal devices Documentation Team. March 2013. About Remote VPN Remote VPN 1 provides staff and students with secure, authenticated remote access to personal and shared

More information

Remote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0

Remote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0 Remote Access Remote Access Start-up Guide Non Cheshire East Council PC s/laptops Page 0 Page 1 1. Getting Started NGD provides easy access to all your Cheshire East documents and applications whilst not

More information

Internet Remote Access FirePass SSL VPN

Internet Remote Access FirePass SSL VPN Internet Remote Access FirePass SSL VPN Remote access to select Central Washington Hospital (CWH) information systems is available for hospital workers. Using a Web browser (Internet Explorer, Firefox,

More information

Multi-Factor Authentication Job Aide

Multi-Factor Authentication Job Aide To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please

More information

Mac Installation and User Guide

Mac Installation and User Guide Remote Access Portal RAP Service Mac Installation and User Guide Contents Introduction... 3 Technical Requirements... 4 Installing RAP with Blackshield (2 Factor)... 7 Troubleshooting... 12 Support...

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone

More information

This guide provides all of the information necessary to connect to MoFo resources from outside of the office.

This guide provides all of the information necessary to connect to MoFo resources from outside of the office. REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office. Connect remotely from your firm notebook using VPN Connect

More information

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Lytecube Technologies. EnCircle Automation. User Guide

Lytecube Technologies. EnCircle Automation. User Guide Lytecube Technologies EnCircle Automation User Guide Lytecube Technologies 1/1/2009 Contents Installation... 3 Using Encircle... 3 Launching EnCircle as a desktop application... 3 Logon Screen... 3 EnCircle

More information

How To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn

How To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn Our Mission Statement To ensure that we are providing quality and efficient services and solutions that are consistent with the strategic goals of the Area, and that are closely aligned with the State's

More information

MRU Secure Remote Access Service (SRAS) External User Guide

MRU Secure Remote Access Service (SRAS) External User Guide MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendor and external clients restricted remote access to MRU internal computing

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7. Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows

More information

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are

More information

Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO)

Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO) Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO) Firm Laptop Windows Home PC Mac Computer Apple ipad Android Devices Exit akingump.com 2015 Akin Gump Strauss Hauer & Feld LLP Check Point

More information

Macs are not directly compatible with Noetix.

Macs are not directly compatible with Noetix. Those that use Macintosh computers to access Noetix cannot directly access Noetix through http://www.sandiego.edu/noetix. If one is on a Mac and goes to Noetix directly in a web browser, the page is likely

More information

SSL VPN Support Guide

SSL VPN Support Guide Page 1 SSL VPN Support Guide Revision date: 4/16/14 Page 2 Table of Contents Before calling the Service Desk..pg 3 What the Service Desk can assist users with. pg 4 Instructions for PC users (Internet

More information

Remote Access: Internet Explorer

Remote Access: Internet Explorer Introduction: Welcome to the MSVU Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

Installing Logos SSL Certificates on Mobile Devices

Installing Logos SSL Certificates on Mobile Devices Installing Logos SSL Certificates on Mobile Devices Phase 1: Obtain the SSL Certificate You can obtain the SSL certificate in one of 2 ways. Method 1 Download the SSL certificate from it.logostech.net

More information

Tips & Tricks SSL VPN - Windows

Tips & Tricks SSL VPN - Windows Tips & Tricks SSL VPN - Windows What is SSL VPN 2 Signing into Meredith s SSL VPN 2 Using Webapp 4 Using File Servers 5 Downloading Files from the Server 5 Uploading Files to the Server 6 Network Connect

More information

Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA)

Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA) Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA) Table of Contents Introduction. 1 Determine your Windows Operating System (for software

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN

Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN OVERVIEW The New York Eye & Ear Infirmary of Mount Sinai Remote Access (VPN) home page allows remote access to the Infirmary

More information

Dial-up Installation for CWOPA Users (Windows Operating System)

Dial-up Installation for CWOPA Users (Windows Operating System) Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend the MS Remote Desktop for Mac client.

More information

THE EDINBURGH NAPIER UNIVERSITY WINDOWS VIRTUAL PRIVATE NETWORK (VPN) GUIDE FOR MAC USERS

THE EDINBURGH NAPIER UNIVERSITY WINDOWS VIRTUAL PRIVATE NETWORK (VPN) GUIDE FOR MAC USERS THE EDINBURGH NAPIER UNIVERSITY WINDOWS VIRTUAL PRIVATE NETWORK (VPN) GUIDE FOR MAC USERS INTRODUCTION... 2 WHAT SERVICES CAN I ACCESS USING THE VPN?... 2 WHAT ARE THE REQUIREMENTS OF THE VPN SERVICE?...

More information

http://vpn.madeleyacademy.com

http://vpn.madeleyacademy.com Madeley Academy Remote Access http://vpn.madeleyacademy.com Members of Staff and Sixth form students are able to log into the shared and their user areas from home. System requirements Antivirus Trusted

More information

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative

More information