YubiKey & OATH- TOTP Verification
|
|
|
- Eustace Doyle
- 10 years ago
- Views:
Transcription
1 YubiKey & OATH- TOTP Verification February 7, 2014 YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 1 of 11
2 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely combines driverless USB hardware with open source software. More than a million users in 100 countries rely on YubiKey strong two-factor authentication for securing access to computers, mobile devices, networks and online services. Customers range from individual Internet users to e-governments and Fortune 500 companies. Founded in 2007, Yubico is privately held with offices in California, Sweden and UK. The contents of this document are subject to revision without notice due to continued progress in methodology, design, and manufacturing. Yubico shall have no liability for any error or damages of any kind resulting from the use of this document. The Yubico Software referenced in this document is licensed to you under the terms and conditions accompanying the software or as otherwise agreed between you or the company that you are representing. Trademarks Yubico and YubiKey are trademarks of Yubico Inc. Contact Information Yubico Inc 228 Hamilton Avenue, 3rd Floor Palo Alto, CA USA [email protected] YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 2 of 11
3 1 Setting up the YubiKey for OATH-TOTP All YubiKey hardware can support the OATH-TOTP standard authentication method, used by services such as Microsoft Cloud accounts, Google Apps, Dropbox, EverNote and GitHub. This method utilizes one of the two configuration slots for a single site; no more than 2 sites or services can be supported on a single YubiKey. If there is a need to support additional sites or services, Yubico recommends the YubiKey NEO used with the YubiKey Desktop Authenticator and YubiOATH Android app. To setup your YubiKey for OATH-TOTP 2-step verification, you will need: Access to the account to be secured with OATH-TOTP The YubiTOTP application A YubiKey version 2.2 (or later) with an empty configuration slot The YubiTOTP application above can be found in the Yubico webpage: Caution: YubiKeys normally come shipped with the first configuration slot Pre-configured with either a Yubico OTP or a Symantec VIP credential. Be extra careful about overwriting this. This guide assumes that you decide to use the second configuration slot, which is empty by default. The procedure adds a Challenge/Response configuration to the YubiKey in HMAC- SHA1 mode using the shared OATH secret from the site or service to be secured. The helper app (YubiTOTP) passes the current system time as a challenge to the YubiKey and processes the response as per the OATH specification to generate a 6 or 8 digit OATH-TOTP code. The helper app is triggered by double clicking the icon in the system tray. The OATH-TOTP 6 or 8 digit response is automatically typed into the text field the cursor is currently in. YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 3 of 11
4 2 Configuring a YubiKey for TOTP on a Secured Site When setting up a YubiKey to work with a site protected with OATH-TOTP, the process will be to take the secret key provided by that site and configure it directly into one of the slots on the YubiKey. While each site will have a different process to present the secret key slightly differently, the process should have some similar steps: 1. Log into your Account Before 2-Factor verification can be applied to any account, you will first need to be able to log into the account. 2. Access Security / 2 nd Factor Verification Settings Most sites or services will have the settings for 2-Factor verification in the Security section of the user account settings. Some sites will require verification of a backup device, like an SMS/text message capable mobile phone, before permitting users to set up a 2 nd Factor Verification device. 3. Select Mobile Application When setting up your YubiKey, you will want to choose the option to set up a Mobile Application for verification; the process for configuring the YubiKey uses the same secret key as used by less secure mobile authentication apps. For ease of use, Yubico recommends selecting Android as the device type if prompted. 4. Look for the QR code Most sites or services first present the secret key as a QR Code (see example below). When a QR code is presented, there should be a link or option to present the secret key as plain text as well, such as an option if the QR code cannot be scanned Example of a QR code image 5. Display the Secret Key as text Clicking on the link or option to display the secret key should display the key as text. The secret key is often displayed in blocks of no more than 4 characters apiece. Example of a Secret Key 6. Copy the Secret Key Copy the Secret Key to the clipboard. It is HIGHLY recommend to also save the secret key to a secure location or to print it out and file it with other records. With a copy of the secret key, a backup YubiKey can be configured to gain access to the secured account in the event your primary YubiKey is unavailable. YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 4 of 11
5 7. Plug in your YubiKey & Launch the YubiTOTP app The YubiTOTP app will automatically configure the YubiKey when the secret code is provided. When running, the YubiTOTP app should appear in the icon tray on the task bar (icon may be hidden at first). The YubiTOTP app will also need to be running to generate the Verification codes once the YubiKey is configured. 8. Open the YubiTOTP Configuration Window Open the configuration window by right clicking the YubiTOTP app taskbar icon. In the Right click context menu, select Show configuration window 9. Configure the OATH-TOTP Settings Check with the service for the OATH-TOTP verification settings. If settings are not explicitly stated by the site or service, use the 6 digit TOTP option and ensure the Use token identifier and Append Enter last options are not checked. 10. Check your YubiKey Ensure the correct YubiKey is plugged in click the Check button on the YubiTOTP configuration window. YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 5 of 11
6 11. Paste the Secret Key in the YubiTOTP app From the Clipboard, paste the secret key into the text field in the YubiTOTP app. This will automatically start the process to program the YubiKey to work with the YubiTOTP app for the OATH-TOTP verification. When prompted to program the selected Configuration slot, select Yes to proceed. 12. Congratulations, your YubiKey has been successfully configured! When the site or service prompts you for the Verification Code, put the cursor in the indicated field, select (or double click) the Yubico icon in the system tray then select "Verify". You may want to configure your system tray so the YubiTOTP icon is always visible "show icon and notifications". 13. Using the YubiTOTP app When asked for a TOTP code from the secured site, make sure the YubiTOTP app is launched. With your configured YubiKey plugged in, click inside the field indicated for the TOTP code, then double click the YubiTOTP icon. The code will be entered automatically. 14. Create a back-up YubiKey A backup YubiKey can be created at any time using the YubiTOTP app and the secret key acquired from the site. Simply follow the previous steps with the new YubiKey, but use your existing secret key instead of requesting a new one from the site or service. Requesting a new secret key from an OATH-TOTP secured site will result in your original YubiKey to no longer be valid for that site or service. YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 6 of 11
7 3 Setting up Google Apps As an example, below are the steps required to set up a Google Apps account s OATH-TOTP 2-factor verification with a YubiKey and the YubiTOTP app. 1. Log in to your Gmail Account and choose "Account". 2. In the Account page, select Security and locate the 2-step verification" section. Click the button labelled settings, and proceed to register for 2-step verification by registering a telephone number to the Google Account. YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 7 of 11
8 3. Once 2-step verification is enabled, locate the Mobile Application section and select the Android option. The actual screen layout may be a bit different based on your region. 4. In the dialog that opens, click the Can t scan the barcode? link under the image and copy the 20 digit key provided. YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 8 of 11
9 5. Launch the YubiTOTP app and right click its taskbar icon. In the Right click context menu, select Show configuration window 6. Plug in your YubiKey and click the Check button on the YubiTOTP configuration window. Make sure the Use token identifier and Append Enter last options are not checked. 7. Paste the Google Application key into the text field in the YubiTOTP app. This will automatically program the YubiKey to work with the YubiTOTP app for the Google Authenticator. YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 9 of 11
10 8. Congratulations, your YubiKey has been successfully configured! When Google prompts you for the Verification Code, put the cursor in the box, select (double click) the Yubico icon in the system tray then select "Verify". You may want to configure your system tray so the YubiTOTP icon is always visible "show icon and notifications". YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 10 of 11
11 4 Troubleshooting If your YubiKey is not generating valid codes, check the following: Make sure the correct YubiKey is inserted. Make sure only a single YubiKey is inserted in the computer. Attempt to enter another code TOTP codes have a limited lifespan, and are often not valid after 30 seconds or less. If a TOTP code is not entered soon enough, it may expire and a new code will need to be generated. Make sure the system time on the host computer is correct if the system time is off, the timedependent codes will not be valid. Make sure the host computer is set to the correct time, or automatically syncing its internal clock to a valid timekeeping site. Make sure your YubiKey is plugged in securely and in the correct orientation with the USB slot. If the LED on the YubiKey is not on, it is not inserted correctly. YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 11 of 11
VIP YubiKey Unlock Guide
VIP YubiKey Unlock Guide Unlocking the VIP YubiKey for YubiCloud OTP February 22, 2013 VIP YubiKey Unlock Guide 2012 Yubico. All rights reserved. Page 1 of 9 Introduction Yubico is the leading provider
Configuring a YubiKey for the YubiCloud
Configuring a YubiKey for the YubiCloud With the YubiKey Cross-Platform Personalization Tool April 9, 2013 Configuring a YubiKey for the YubiCloud 2012 Yubico. All rights reserved. Page 1 of 8 Introduction
NetMotion + YubiRADIUS Quick Start Guide
NetMotion + YubiRADIUS Quick Start Guide March 22, 2013 NetMotion + YubiRADIUS Quick Start Guide 2012 Yubico. All rights reserved. Page 1 of 7 Introduction Disclaimer Yubico is the leading provider of
NEO Manager Quick Start Guide
NEO Manager Quick Start Guide For the YubiKey NEO and NEO-n Version 1.1 November 19, 2014 NEO Manager Quick Start Guide 2014 Yubico. All rights reserved. Page 1 of 6 About Yubico Disclaimer As the inventors
Yubico Authenticator User's Guide
Yubico Authenticator User's Guide YubiKeys with desktop computers and NFCenabled Android smartphones Yubico Authenticator User's Guide 2016 Yubico. All rights reserved. Page 1 of 23 Copyright 2016 Yubico
YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015
YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,
September 25, 2015. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication
Programming YubiKeys for Okta Adaptive Multi-Factor Authentication September 25, 2015 Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 1 of 14 Copyright 2015 Yubico Inc. All rights
Yubico YubiHSM Monitor
Yubico YubiHSM Monitor Test utility for the YubiHSM Document Version: 1.1 May 24, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
YubiKey Authentication Module Design Guideline
YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company
Multi-Factor Authentication for first time users
Multi-Factor Authentication for first time users **Multi-Factor Authentication will be required for all Duke University accounts on July 1 st, 2016.** What is Multi-Factor Authentication (MFA)?? Multi-factor
NetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
YubiRADIUS Deployment Guide for corporate remote access. How to Guide
YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
YubiCloud OTP Validation Service. Version 1.2
YubiCloud OTP Validation Service Version 1.2 5/12/2015 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely
2-FACTOR AUTHENTICATION WITH
2-FACTOR AUTHENTICATION WITH 2X JUNE 2014 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone
Yubico PIV Management Tools
Yubico PIV Management Tools Active Directory Smart Card Logon using the YubiKey NEO or NEO-n Document Version 1.0 April 15, 2015 Yubico PIV Management Tools 2015 Yubico. All rights reserved. Page 1 of
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com
Yale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, [email protected] Two-factor authentication: Installation and configuration instructions for
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------
USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Two-Factor Authentication
Two-Factor Authentication Two-Factor Authentication is an enhanced security feature for Payentry. It adds an extra layer of protection to ensure only authorized users can gain access to your data. In addition
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.
Mobile Pay. for Android TM. *Android Version 4.0 or higher required
Mobile Pay TM for Android TM *Android Version 4.0 or higher required 2014 First Data Corporation. All Rights Reserved. All trademarks, service marks and trade names referenced in this material are the
Device LinkUP + Desktop LP Guide RDP
Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Mac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
YubiKey Integration for Full Disk Encryption
YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The
Remote Desktop Services User's Guide
Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015
LP 2844 Thermal Printer
Quick Installation Guide FedEx Ship Manager Software FedEx Ship Manager at fedex.com LP 2844 Thermal Printer Step 1: Confirm Printer Kit Contents Your printer kit contains: 1. Thermal Printer 4. Serial
YubiCloud Validation Service. Version 1.1
YubiCloud Service Version 1.1 5/29/2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely combines
MCBDirect Corporate Logging on using a Soft Token
MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft
NetIQ Advanced Authentication Framework - Smartphone Applications
NetIQ Advanced Authentication Framework - Smartphone Applications User Guide Version 3.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Install Smartphone
Transferring Scans from your Dolphin into Destiny
Transferring Scans from your Dolphin into Destiny Summary: This article is intended to provide Destiny users with an overview of the following tasks 1. Downloading the Dolphin Transfer Utility to their
Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
DUO SECURITY CISCO VPN USER GUIDE 1/27/2016
DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 CONTENTS Enrolling Your Devices... 2 Install Cisco AnyConnect VPN Client... 6 Connecting to a PC with Microsoft Remote Desktop... 8 Disconnecting the AnyConnect
SafeNet Authentication Client (Windows)
SafeNet Authentication Client (Windows) Version 8.1 SP1 Revision A User s Guide Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
YubiKey with Password Safe
Authentication concepts Author: Felicia King Authentication concepts Single-factor authentication Single-factor authentication is inherently flawed. Hackers and criminals install keystroke loggers, screen
Welcome to ncrypted Cloud!
Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.
User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10
Two-Factor Authentication
Two-Factor Authentication The two-factor authentication system provides an additional level of security when signing in to Ryerson web applications via Ryerson s Central Authentication Service. When you
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
KANGAROO MOBILE DESKTOP USER GUIDE
KANGAROO MOBILE DESKTOP USER GUIDE Copyright InFocus Corporation., 2015. All rights reserved. This document contains information proprietary to InFocus Corporation, hereinafter InFocus. Use or disclosure
Important Notes for WinConnect Server ES Software Installation:
Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation
Steps for using MagicConnect
Getting Started Getting Started MagicConnect is a remote access service that allows you safe remote access to a target device from your remote device. What is a remote device? It is a Windows device, iphone/ipad,
Getting Started with POS. Omni POS Getting Started Manual. switched on accounting
Omni POS Getting Started Manual switched on accounting i i Getting Started with Omni POS Table Of Contents Overview...1 Setting up POS...2 Initial Steps...2 Tellers...2 POS Clearing Account...3 Printing...4
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA
How to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
Mobility with Eye-Fi Scanning Guide
Mobility with Eye-Fi Scanning Guide Scan and Transfer Images Wirelessly with Eye-Fi This document is to be used in addition to the scanner s user guide located on the installation disc. The instructions
VERIZON WIRELESS VZACCESS MANAGER QUICK START GUIDE FOR PC CARDS
VERIZON WIRELESS VZACCESS MANAGER QUICK START GUIDE FOR PC CARDS WELCOME Congratulations on purchasing VZAccess Manager the most popular data connectivity solution for wireless Internet access. This Quick
Two Factor Authentication - USER GUIDE
Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.
Free Multi-Factor Authentication. Using Email and SMS in Enterprise/Random Password Manager (E/RPM)
Free Multi-Factor Authentication Using Email and SMS in Enterprise/Random Password Manager (E/RPM) The controlled release of sensitive credentials in a privileged identity management (PIM) system requires
ecstudent-ts Terminal Server How to Use
ecstudent-ts Terminal Server How to Use Connect to Cisco Any Connect Connect to Terminal Server, Set Options to Use Home Computer Files, Printers, Clipboard Use Network Folders Copy Files from Network
Note: This documentation was written using the Samsung Galaxy S5 and Android version 5.0. Configuration may be slightly different.
University Information Technology Services Training, Outreach, Learning Technologies & Video Production HallPass Instructions for Connecting to PC with an Android Device Note: This documentation was written
MiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
Remote Access End User Guide (Cisco VPN Client)
Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED
Cloud Attached Storage
Backing Up and Restoring SQL Server Databases Cloud Attached Storage February 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in
Simple Computer Backup
Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:
PROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
Step 1. Step 2. Open your browser and go to https://accounts.bestcare.org and you will be presented a logon screen show below.
Manage your two-factor options through the accounts.bestcare.org website. This website is available internally and externally of the organization. Like other services, if you connect while external of
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Guide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer
i-stat TECHNICAL BULLETIN Configuring Wireless Settings in an i-stat 1 Wireless Analyzer Before configuring wireless settings, please enable the wireless functionality by referring to the Technical Bulletin
Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail
Solution domain Cloud PC Backup Startingkit for users Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail Table of contents Table of contents... 2 1. What is Cloud PC Backup?...
March 2012. How Eye-Fi Works Overview Flowcharts
March 2012 How Eye-Fi Works Overview Flowcharts 2012 Visioneer, Inc. (A Xerox Trademark Licensee) All rights reserved. XEROX, XEROX and Design, and DocToMe are registered trademarks of Xerox Corporation
Cloud Print Edition Quick Start Guide
WHAT S INSIDE Quick Start Guide xprintserver Power supply with regional adapters 3 Ethernet Cable Mounting Bracket & 2 Screws Rubber Feet (4) 1 BEFORE YOU BEGIN 1. If you intend to connect a USB printer
Implementation Guide for protecting
Implementation Guide for protecting Remote Web Workplace (RWW) Outlook Web Access (OWA) 2003 SharePoint 2003 IIS Web Sites with BlackShield ID Copyright 2010 CRYPTOCard Inc. http:// www.cryptocard.com
Millennium SMS. Setup Guide. Version 1.01
Millennium SMS Setup Guide Version 1.01 Copyright Information 2013 Millennium by Harms Software Inc. All rights reserved. Every effort has been made to ensure that the information in this guide is accurate.
Abila Nonprofit Online. Connection Guide
Abila Nonprofit Online This is a publication of Abila, Inc. 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned
Presto User s Manual. Collobos Software Version 1.1. 2013 Collobos Software, Inc! http://www.collobos.com
Presto User s Manual Collobos Software Version 1.1 2013 Collobos Software, Inc! http://www.collobos.com Welcome To Presto! 3 AirPrint! 3 Google Cloud Print! 3 System Requirements! 3 How It Works! 5 PrintKit
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks
Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
Using GhostPorts Multi-Factor Authentication
Using GhostPorts Multi-Factor Authentication With CloudPassage Halo GhostPorts is a powerful multi-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans.
Getting Started With Halo for Windows
Getting Started With Halo for Windows For CloudPassage Halo Protecting your Windows servers in a public or private cloud is much easier and more secure with CloudPassage Halo for Windows. Halo for Windows
USB 2.0 to VGA Quick Installation Guide
Introduction USB 2.0 to VGA Quick Installation Guide The USB 2.0 to VGA allows you to connect an additional display to your desktop or notebook PC and use it as an extended desktop or as an additional
CRM Connector Installation & Integration USER GUIDE
CRM Connector Installation & Integration USER GUIDE TABLE OF CONTENTS Table Of Contents Installation... 4 System Tray Icon.... 5 Salesforce.com Integration.... 6 Salesforce Security Token.... 6 Configuration....
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO)
Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO) Firm Laptop Windows Home PC Mac Computer Apple ipad Android Devices Exit akingump.com 2015 Akin Gump Strauss Hauer & Feld LLP Check Point
HP Point of Sale (POS) Peripherals Configuration Guide 2D Imaging / Linear / Presentation Scanner
HP Point of Sale (POS) Peripherals Configuration Guide 2D Imaging / Linear / Presentation Scanner Document Version 3.42 December 2011 1 Copyright 2007-2011 Hewlett-Packard Development Company, L.P. The
Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA)
Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA) Table of Contents Introduction. 1 Determine your Windows Operating System (for software
NEC CLOUD STORAGE. Demo Guide
NEC CLOUD STORAGE Demo Guide 2014 1 INTRODUCTION... 4 1.1 GOALS OF THIS DOCUMENT... 4 1.2 TERMS, ACRONYMS AND ABBREVIATIONS... 4 2 INTRODUCTION TO NEC CLOUD STORAGE... 5 2.1 WHAT IS NEEDED TO USE CLOUD
You can find the installer for the +Cloud Application on your SanDisk flash drive.
Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click
Getting Started... 1. What s included... 1. Setting up Fitbit One on a computer... 2. Mac & PC Requirements... 2
User Manual Table of Contents Getting Started... 1 What s included... 1 Setting up Fitbit One on a computer... 2 Mac & PC Requirements... 2 Installing Fitbit Connect on a computer... 2 Installing Fitbit
8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
QUICK START GUIDE Bluetooth Cordless Hand Scanner (CHS)
QUICK START GUIDE Bluetooth Cordless Hand Scanner (CHS) 1D Imager Models CHS 7Ci, 7Di, 7DiRx LED Trigger button Power button (also for ios Keyboard Pop-up) Model shown: CHS 7Di This document pertains to
Getting to Know Your Mobile Internet Key
Thank you for choosing the Huawei E3276 4G LTE Mobile Internet Key. With your Mobile Internet Key, you can enjoy a full high speed Internet experience on the go. This guide shows you how to set-up and
HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services
1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide
Replacing legacy twofactor authentication with YubiRADIUS for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection.
IONU BETA USER MANUAL IONU Security, Inc.
2014 IONU BETA USER MANUAL IONU Security, Inc. Contents IONU Solution Intro... 3 Account Installation Process... 4 Account Creation - Windows... 5 Inviting Others... 6 IONU Secure File System... 7 Storage
Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00
Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 www.griaulebiometrics.com Brazil Phone: 55-19-3289-2108 USA Phone: (408) 490 3438 Fingerprint Identity Index Getting
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
Mobile Printing. User's Guide
Mobile Printing User's Guide December 2015 www.lexmark.com Contents 2 Contents Change history... 4 Overview... 5 Lexmark Mobile Printing Application...6 Getting started...6 System requirements...6 Installing
Scan2CRM - SalesForce
CSSN Scan2CRM - SalesForce USER GUIDE Version 2.0.0.2 1 This publication contains proprietary information of the Card Scanning Solutions Company, provided for customer use only. No other uses are authorized
Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete
Backups User Guide for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot
Entrust Certificate Services for Adobe CDS
Entrust Certificate Services Entrust Certificate Services for Adobe CDS Getting Started Guide Entrust SafeNet Authentication Client: 8.3 Date of issue: July 2015 Document issue: 3.0 Revisions Issue and
Windows XP Chinese Character Support Installation Instruction
Windows XP Chinese Character Support Installation Instruction Windows XP has a utility to allow user to modify language sets for both multi-language input and viewing of foreign character sets. This document
