How To Use A Smart Card With A Fingerprint On A Card On A Pc Or A Smartcard On A Microsoft Gina (Smart Card) On A Powerbook (Smartcard) On Windows Xp (Windows Xp) On An Iphone

Size: px
Start display at page:

Download "How To Use A Smart Card With A Fingerprint On A Card On A Pc Or A Smartcard On A Microsoft Gina (Smart Card) On A Powerbook (Smartcard) On Windows Xp (Windows Xp) On An Iphone"

Transcription

1 .NET Bio Solution for Windows XP Administrator Guide

2 All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to file patent applications or any other kind of intellectual property protection in connection with such information. Nothing herein shall be construed as implying or granting to you any rights, by license, grant or otherwise, under any intellectual and/or industrial property rights of or concerning any of Gemalto s information. This document can be used for informational, non-commercial, internal and personal use only provided that: The copyright notice below, the confidentiality and proprietary legend and this full warning notice appear in all copies. This document shall not be posted on any network computer or broadcast in any media and no modification of any part of this document shall be made. Use for any other purpose is expressly prohibited and may result in severe civil and criminal liabilities. The information contained in this document is provided AS IS without any warranty of any kind. Unless otherwise expressly agreed in writing, Gemalto makes no warranty as to the value or accuracy of information contained herein. The document could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Furthermore, Gemalto reserves the right to make any change or improvement in the specifications data, information, and the like described herein, at any time. Gemalto hereby disclaims all warranties and conditions with regard to the information contained herein, including all implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Gemalto be liable, whether in contract, tort or otherwise, for any indirect, special or consequential damages or any damages whatsoever including but not limited to damages resulting from loss of use, data, profits, revenues, or customers, arising out of or in connection with the use or performance of information contained in this document. Gemalto does not and shall not warrant that this product will be resistant to all possible attacks and shall not incur, and disclaims, any liability in this respect. Even if each product is compliant with current security standards in force on the date of their design, security mechanisms' resistance necessarily evolves according to the state of the art in security and notably under the emergence of new attacks. Under no circumstances, shall Gemalto be held liable for any third party actions and in particular in case of any successful attack against systems or equipment incorporating Gemalto products. Gemalto disclaims any liability with respect to security for direct, indirect, incidental or consequential damages that result from any use of its products. It is further stressed that independent testing and verification by the person using the product is particularly encouraged, especially in any application in which defective, incorrect or insecure functioning could result in damage to persons or property, denial of service or loss of privacy. Copyright Gemalto N.V. All rights reserved. Gemalto and the Gemalto logo are trademarks and service marks of Gemalto N.V. and/or its subsidiaries and are registered in certain countries. All other trademarks and service marks, whether registered or not in specific countries, are the property of their respective owners. GEMALTO, B.P. 100, GEMENOS CEDEX, FRANCE. Tel: +33 (0) Fax: +33 (0) Printed in France. Document Reference: D G (Formerly DOC117961) 17 January, 2012

3 Contents Introduction... iv Who Should Read This Book... iv Typographical Conventions... v Contact.NET Bio Support... v Biometric Reader/Sensor Support... v Overview... 1 Why Choose the Gemalto.NET Bio Solution?... 1 Why Biometrics?... 1 Why Biometrics Match-on-Card (MoC)?... 2 Why Gemalto.NET Bio?... 2 Key Features and Benefits... 2 Installing.NET Bio... 4 Software Requirements... 4 Hardware Requirements... 4 Compatible Smart Card Readers... 4 Compatible Fingerprint Sensors... 5 Installation... 5 Uninstallation... 5.NET Bio Components... 6 On-Card Components... 7 Off-Card Components... 7 Using the.net Bio Solution... 9 Using.NET Bio GINA and Bio & PIN Manager Logging on to Windows XP in PIN-only mode Changing the User Verification Mode Enrolling Fingerprints for Biometric Authentication Adding or Deleting Biometrics Logging on to Windows XP in Fingerprint-Only Mode Logging on to Windows XP in PIN-or-Fingerprint Mode Logging on to Windows XP in PIN-and-Fingerprint Mode Locking/Unlocking the System Unblocking Biometrics Using.NET Bio Verification with Smart Card-enabled Applications Applying a Digital Signature to an using MS Outlook Accessing a VPN Network... 26

4 Introduction Gemalto.NET Bio is an innovative software solution that works with Gemalto.NET smart cards to seamlessly integrate biometrics technology into Windows XP. Organizations deploy Gemalto smart cards and tokens among their employees to be used for strong user authentication to their networks as well as for data encryption and digital signature services. Gemalto.NET smart cards are: integrated into the Windows Smart Card Framework. This means that they not only work with Windows XP but any Microsoft and third-party applications that also support WSF architecture supported in Windows XP. This enables the devices to work seamlessly with Microsoft Terminal Services, Active Directory, Active Directory Federation Services and Windows smart card login. the first commercial smart card to implement a streamlined version of the.net Framework. Building upon this smart card technology, the.net Bio solution enables the use of fingerprint match-on-card (MoC) user authentication as an alternative or complement to smart card PIN verification. With.NET Bio, companies can implement a secure two- or three-factor authentication system that is convenient for users, easy to deploy and manage, and fully compatible with the smart card security components in Windows XP. The solution is also compatible with the vast majority of fingerprint sensors available in the market. This manual explains how to use the.net Bio solution on Windows XP systems. Who Should Read This Book This book is intended for IT administrators who will be deploying the.net Bio solution across their organization. It is assumed that the reader of this document has: an understanding of the Windows XP operating system and the Windows Smart Card Framework. an understanding of Gemalto.NET smart cards, smart card readers and fingerprint sensors. administrative privileges for the PC on which the.net Bio solution will be used.

5 v Introduction Typographical Conventions This document uses the following typographical conventions: Table 1: Typographical Conventions Convention Example Description Bold Enter libgclib.dylib Actual user input or screen output. > Select File > Open Indicates a menu selection. In this example you are instructed to select the Open option from the File menu. Contact.NET Bio Support If you do not find the information you need in this manual, or if you find errors, please report them to Gemalto.NET Bio Support: dotnetbiosupport@gemalto.com Biometric Reader/Sensor Support If you experience problems with any fingerprint readers or sensors, make sure you have loaded the latest drivers from the appropriate web manufacturer s web site. The.NET Solution for Windows Release Notes gives a list of the fingerprint readers and sensors supported by Gemalto for the.net Bio Solution, and a list of the web sites from where you can find the latest drivers.

6 1 Overview Traditionally, smart cards are protected by a PIN intended to verify that the holder of the device is its legitimate owner..net Bio implements fingerprint verification on the smart card to provide four alternative card holder verification methods: PIN only; fingerprint only; fingerprint or PIN; and fingerprint and a PIN for the highest level of security. The following components are required for using the.net Bio solution: smart card reader, fingerprint sensor for biometric authentication, Gemalto.NET Bio client software, a Gemalto.NET smart card device with the Biometrics assembly loaded on it and Windows XP. The fingerprint sensor and the smart card reader may be integrated with the client system, or they can be external devices connected via USB. Why Choose the Gemalto.NET Bio Solution? The.NET Bio solution integrates the best in authentication technologies smart cards and fingerprint recognition to deliver unmatched security and flexibility for Windows XP. Why Biometrics? Identity: Biometrics allow user authentication based on a unique physical personal characteristic. From a user s perspective, there is a stronger perception of personal representation compared to user names and passwords or PINs. Security: Depending on the implementation, biometrics (something you are) can enhance the security of a solution when combined with other authentication factors, such as a smart card or token (something you have) and/or a password or PIN (something you know). Convenience: Compared to passwords, biometrics can t be forgotten. Users don t have to keep track of them. They are always available and always with the user.

7 2 Overview Why Biometrics Match-on-Card (MoC)? Security: By design, smart cards are highly secure and tamper-proof. Because of this, storage and verification of biometric credentials on a smart card are safer than on a non-secure device or network. Combining smart cards with biometrics technology produces a highly secure, three-factor authentication solution. Convenience: Biometrics match-on-card (MoC) technology delivers the ultimate in portability. Users can log on throughout the corporate network using their smart card or token and biometric credentials. Privacy: The match is performed on the card. Biometric credentials never leave the card, so users can be assured of their privacy. Compliance: Some countries have security regulations that prevent the storage of biometric information within any database. Biometrics MoC technology ensures compliance by storing information on the card. Why Gemalto.NET Bio?.NET Bio offers an unmatched level of integration with the Windows XP operating system, delivering significant benefits for both corporations and end users. The.NET Bio solution builds on top of the latest release of the Windows Smart Card Framework (WSF). This provides consistency with the Windows XP environment, while requiring a minimum amount of software to be loaded on the XP client less than 7 MB. By complying with the WSF architecture, the.net Bio solution supports not only the XP operating system, but all Microsoft applications that provide smart card support, as well as third-party applications that support the Windows Smart Card Framework. Key Features and Benefits.NET Bio replaces passwords with strong two- or three-factor authentication for secure logon, remote access, encryption and digital signature services. It is compatible with approximately 90% of the fingerprint sensors on the market, and supports enrollment of up to 10 fingerprints. Some of the key benefits include: Portability: Biometric credentials and digital certificates are stored on the user s smart card; thus, these users can freely and securely roam, log on and use any computer on the corporate network. Convenience: By replacing a password or PIN with their fingerprint, users no longer need to remember or type in long, frequently changing passwords. Security: For corporations committed to the deployment of a smart card infrastructure,.net Bio enhances security by enabling the use of biometrics as a third factor of authentication. For corporations interested in the deployment of biometric technology for user identification,.net Bio provides secure storage and verification of the biometric credentials inside the.net smart card. Cost Savings: The majority of Help Desk calls are related to forgotten passwords or user PINs..NET Bio delivers a secure alternative that greatly reduces the need for password resets, helping to lower Help Desk support costs. Ease of Use: With a straightforward interface for end users, deployment and management of biometric solutions are streamlined for Windows XP.

8 Overview 3 User Verification Modes The.NET Bio solution provides a choice of four user verification modes, as shown below: Table 2:.NET Bio Solution User Verification Modes Input Remarks PIN only Fingerprint only PIN or fingerprint PIN and fingerprint This is the default mechanism for user authentication, as defined by the Windows Smart Card Framework. Fingerprints are matched against a template previously stored on the smart card. This replaces the use of a smart card PIN. For the ultimate in convenience, users can choose to authenticate with their smart card PIN or fingerprint(s). For maximum security, users must present their fingerprint and enter their smart card PIN. Both are matched against values stored in the smart card. This provides highly secure three-factor authentication the card, the PIN and the fingerprint(s)..net Bio GINA The Graphical Identification and Authentication (GINA) is a.dll used by Windows Logon. The.NET Bio GINA provides biometric support for classic credential management scenarios, such as: Smart Card Logon Computer Unlock Biometrics and PIN Manager This tool provides an interface to enable you to: Unblock the.net Bio smart card Change the user verification mode Manage user fingerprints, including fingerprint enrollment Manage the user PIN. Smart Card Enabled Applications The.NET Bio solution may be used with other smart card-enabled applications, including: Microsoft Office (Word, Excel and PowerPoint) for digital signature of documents Microsoft Outlook for digital signatures and encryption of Microsoft Internet Explorer Other Microsoft applications supporting Windows Smart Card Framework Third-party applications on XP supporting Windows Smart Card Framework For details about the versions of these applications supported by this version of.net Bio, please refer to the Release Notes. For the latest information about applications supported by.net Bio, please go to Gemalto s.net Bio web site at

9 2 Installing.NET Bio Software Requirements The current version of the.net Bio Solution works with Windows XP. Windows Server 2003 is not supported. Before using Gemalto.NET Bio cards, you must install the following software on the PC: Microsoft Base CSP v5. This is already included with Windows XP SP3. If you are using an earlier version of XP, either install Service Pack 3 or download the Base CSP V5 from Microsoft.NET Framework 3.5. This can be downloaded from The Gemalto Minidriver.dll. This can be downloaded from Instructions on how to do so are in the.net Smart Card in a Windows Environment Administration and User Guide. Hardware Requirements The use of the.net Bio solution requires the following devices: A smart card reader for the Gemalto.NET smart card A fingerprint sensor for biometric authentication Compatible Smart Card Readers The smart card reader may be integrated with the Windows XP system or it can be an external device that is connected via USB. The solution is compatible with any certified Chip Card Interface Device (CCID), USB class or embedded smart card reader.

10 Installing.NET Bio 5 Compatible Fingerprint Sensors Both swipe and flatbed fingerprint sensors can be used with the.net Bio solution. The fingerprint sensor may be integrated into any laptop, or it can be an external device that is connected via USB. For a list of the fingerprint readers and sensors supported by this version of.net Bio, please refer to the Release Notes. Note: Gemalto and its partner Precise Biometrics are continuously integrating support for additional fingerprint readers/sensors. Support for new fingerprint readers will be provided through maintenance releases of the.net Bio solution. Installation To install.net Bio on your computer: 1. Double-click the file Gemalto.NET Biometrics Solution for XP vx.x.x.msi to start installing the.net Bio software. If you do not have one of the items listed in Software Requirements on page 4 installed on the computer, a message appears telling you this. 2. When the Welcome dialog box appears, click Next to continue. 3. When the License Agreement dialog box appears, read and accept the terms and click Next to continue. Note: You can print the License Agreement from this dialog box. 4. Either accept the default installation directory (recommended) or choose a new location by clicking Change and navigating to a different location. Click Next. 5. When the installation window appears, click Install. A progress bar displays during the installation. 6. When the completed window appears, click Finish. 7. Reboot your computer when prompted. A short-cut icon appears on the Windows desktop for the Biometrics and PIN Manager. Uninstallation Normally you should not need to uninstall.net Bio as this happens automatically when you install a new version. However, if you need to uninstall it manually, the procedure is: To remove.net Bio from your computer: 1. Open the Control Panel (Start > Settings > Control Panel). 2. Click Add or Remove Programs. 3. Select.NET Bio in the list and click Remove. 4. Click Yes in the confirmation box that appears. A progress bar displays during the removal. At the end of the removal, the progress bar closes, removal is complete and.net Bio is removed from your computer. 5. If prompted, restart your computer.

11 3.NET Bio Components The architecture of the Gemalto.NET Bio solution relies on the Microsoft Base Cryptographic Service Provider v5 (Base CSP v5) component that is native in Windows XP SP3. The.NET Bio solution consists of both on-card and off-card components, as shown in Figure 1. These include two applications that reside on the Gemalto.NET smart card itself, and some libraries that must be installed in the C:\Windows\System 32 directory on the client computer. Components installed on the client PC enable the user s biometric credentials to seamlessly interact with the Microsoft operating system and applications. Figure 1:.NET Bio On-Card and Off-Card Components

12 .NET Bio Components 7 On-Card Components.NET Bio includes the following on-card components:.net operating system and OTP - OATH assembly similar to standard Gemalto.NET smart cards Minidriver v7 Assembly: Minidriver assembly that is compliant with the Microsoft Minidriver v7 Specification and paired with the off-card minidriver library. It also implements a Bio API for communication with the other on-card application, the Biometrics Assembly Biometrics Assembly: Stores the biometric credentials and implements the matching algorithm used to verify fingerprints. Off-Card Components.NET Bio requires the following client libraries to be installed in the Windows\System32 directory. Three of them implement a User Interface as shown in Figures 2 4. Minidriver DLL: Certified by Microsoft as compliant with the Microsoft Minidriver v7 Specification. Biometrics and PIN Manager: Integrates options for Biometric Logon, Smart Card Unblock, Change User Verification and Fingerprint Enrollment. This appears as an icon on the Windows Desktop. Double-Click this icon to start the Biometrics and PIN Manager. Figure 2: Gemalto Biometrics & PIN Manager

13 8.NET Bio Components Fingerprint Enrollment and User Verification Mode Selection UI Figure 3:.NET Bio Fingerprint Enrollment and User Verification Mode Screens Verification UI: Provides the interface for user authentication through PIN and/or biometrics for all four user verification modes. Figure 4:.NET Bio Verification Screens

14 4 Using the.net Bio Solution This chapter describes how to use the.net Bio solution. Warning: You can connect ONE.NET card reader at any one time. This includes hardware devices such as Gemalto s Smart Enterprise Guardian and Smart Guardian that contain a.net card. Using the Gemalto.NET Bio GINA and the Biometrics & PIN Manager tool Log on to Windows XP. Change the user verification mode. Initial fingerprint enrollment. Add Biometrics Delete Biometrics Lock/unlock the system. Unblock biometrics. Using Gemalto.NET Bio Verification with smart card enabled applications The following examples are described in this chapter, however, many other applications are possible. Outlook signature and / or encryption Microsoft VPN authentication.

15 10 Using the.net Bio Solution Using.NET Bio GINA and Bio & PIN Manager The following assumptions are used for the purpose of describing the selected use cases in this chapter: The person working on the PC is the end-user, and the use cases are described accordingly The user is working on PC running under Windows XP.NET Bio software has been installed on the user s PC The smart card reader and fingerprint sensor are both connected and working properly The.NET smart card is set to its default configuration One logon/signature X.509 certificate has been already enrolled on the card No fingerprints have been enrolled on the card Warning: The logon certificate must be specified as the default certificate. Fingerprint Management Access Condition The windows that appear for certain operations depend on this configurable parameter. If set to admin, the user s rights are limited. He or she needs support from the Administrator (the response to a 16-digit challenge) for the Unblock User Fingerprints and Change User Verification Mode operations. The Change User Fingerprints option is not available. The user would have to perform a Unblock User Fingerprints operation and request a response to the challenge from the Administrator. If set to pin, the user can perform most operations just by authenticating him/her self according to the active User Verification Mode. However the Unblock User Fingerprints operation does still require a response to the 16-digit challenge from the Administrator.

16 Using the.net Bio Solution 11 Logging on to Windows XP in PIN-only mode 1. Start the PC and wait for the Welcome to Windows window as shown in Figure 5: Figure 5: Welcome to Windows 2. Insert the smart card into your smart card reader. 3. In the Log On to Windows window, type your PIN, and click OK. If the PIN matches the one stored on the card, your Windows XP desktop starts. Figure 6: Log On to Windows (PIN Mode)

17 12 Using the.net Bio Solution Changing the User Verification Mode Once logged into an XP session, you can access the Biometrics & PIN Manager to change the mode of user verification to Fingerprint Only and to enroll fingerprints on the Gemalto.NET smart cards: This section describes the procedure to change the user verification mode from the user s perspective. To change the user verification mode from PIN Only to Fingerprint Only: 1. Double-click the icon to start the Biometrics & PIN Manager as shown in Figure 7: Figure 7: Biometrics & PIN Manager (PIN Mode) 2. Click Set Card Mode. 3. The next step depends on whether the Fingerprint Management Access Condition parameter is set to admin or pin. If set to admin: The Administrator Authentication dialog appears, displaying a 16-digit challenge. Ask the administrator for the corresponding 16-digit response and enter it as shown in the following figure, then click OK.

18 Using the.net Bio Solution 13 Figure 8: Admin Authentication (Challenge-Response) 16-digit challenge provided by the card 16-digit response presented by user If set to pin: You are presented with the current user verification (PIN only) in our example. Authenticate yourself and click OK. 4. The Change User Verification Mode window (Figure 9) appears. Choose Fingerprint. Figure 9: Change User Verification Mode 5. Click Next, and then Finish. 6. In our example, we do not yet have any fingerprints enrolled on the card. In this case, the Enrollment Wizard starts automatically (Figure 11: Fingerprint Enrollment Wizard). The rest of the procedure is as described after Figure 11 on page 15.

19 14 Using the.net Bio Solution Enrolling Fingerprints for Biometric Authentication Before you can begin using fingerprint recognition with the.net Bio solution, you first need to enroll one or more fingerprints onto the card. The fingerprint information is written to and stored on the card. You can enroll up to 10 fingerprints and then select which ones are used for verification. The.NET Bio solution works with both swipe and flatbed fingerprint sensors. Fingers should be clean before scanning them. The following tips can also help ensure an optimal enrollment. Note: The card must not be in UVM1 (PIN only) mode. Tips for Using a Fingerprint Sensor Swipe Sensor: To help ensure successful readings with a swipe fingerprint sensor: Swipe your finger flat on the sensor with constant speed. Make sure the whole area marked in orange is scanned. Do not use your fingertip. Do not rotate your finger while swiping. Do not lift your finger while swiping. Flatbed Sensor: To help ensure successful readings with a flatbed fingerprint sensor: Place your finger flat on the sensor. Make sure that the whole area marked on the orange zone is scanned. Make sure you position your finger so that your cuticle is level with the center of the sensor. Make sure your finger is placed straight, not rotated. Do not place your finger too far down on the sensor. Avoid skewed or misaligned finger placement. Enrolling Fingerprints To enroll one or more fingerprints for biometric authentication with the.net Bio solution: 1. Double-click the icon to start the Biometrics & PIN Manager. 2. Note that the Biometrics & PIN Manager now offers 2 options. Click Unblock Biometrics.

20 Using the.net Bio Solution 15 Figure 10: Biometric and PIN Manager (Fingerprint only mode) 3. The Administrator Authentication dialog appears again as in Figure 8, displaying a 16-digit challenge. Ask the administrator for the corresponding 16- digit response and enter it in Response. 4. Click OK. Once the response is presented and validated, the Fingerprint Enrollment wizard (Figure 11) appears. Figure 11: Fingerprint Enrollment Wizard 5. Click Next in the Welcome screen. This opens the Fingerprint Selection window.

21 16 Using the.net Bio Solution Figure 12: Fingerprint Selection 6. Select the fingertip to enroll. You are asked to scan the selected finger. Figure 13: Fingerprint Enrollment

22 Using the.net Bio Solution Place (or swipe) your finger on the fingerprint sensor when prompted by the Fingerprint Enrollment Window (Figure 13). You are prompted to do it again to get a 2 nd sample. If both samples have enough points in common, the quality check will be positive. Otherwise you will be asked to provide 2 new samples (resampling). Note: If you have problems getting the swipe samples to succeed, you may find it useful to click Guidelines for fingerprint scanning. When successful, the arrow points to Done, and the Next button is enabled as shown in Figure 14. Figure 14: Successful Fingerprint Capture 8. Click Next. This returns you to the Fingerprint Selection window (Figure 12). If you want to enroll more fingerprints, repeat steps 6 & When you have finished, click Next. The newly enrolled fingerprints will be stored on the card. 10. Click Finish, then OK to close the enrollment wizard.

23 18 Using the.net Bio Solution Adding or Deleting Biometrics After you enroll one or more fingerprints on the smart card, you can add new ones later, or delete them as described here. Note: You cannot delete a fingerprint if this means you would have less than the minimum number of FPs required value (determined during card personalization). If you try to do this, your attempted deletion simply has no effect. Caution: Before attempting to delete fingerprints, be aware that there is a situation where you could accidentally block the card. This situation occurs only in the following scenario: The minimum number of fingerprints allowed is 0 AND you are using UVM2 or UVM4 AND the Fingerprint Management Access Condition (described on page 10) mode is pin. If in this scenario you delete the last fingerprint and exit the FMA before enrolling a new one, the card is blocked (because you cannot re-authenticate yourself). This is equally true of course for this scenario if you exit the FMA before you have enrolled any fingerprints in the first place. By default, the Fingerprint Management Access Condition is configured as admin, which does not cause this problem. 1. Double-click the icon to start the Biometrics & PIN Manager. The procedure to add fingerprints depends on whether the configurable parameter Fingerprint Management Access Condition is set to admin (default value) or pin. Both possible scenarios are described here: 2. If Fingerprint Management Access Condition is set to Admin In this case, the Biometrics & PIN Manager does not present a Change Biometrics option (Figure 10). Click Unblock Biometrics instead. The Administrator Authentication dialog displays. Ask the administrator for the corresponding 16-digit response and enter it as shown. Figure 15: Admin Authentication (Challenge-Response) 16-digit challenge provided by the card 16-digit response presented by user

24 Using the.net Bio Solution 19 After successful presentation of the response, the Welcome to Fingerprint Enrollment window displays (Figure 11 on page 15). If Fingerprint Management Access Condition is set to PIN Click Change Biometrics. The verification window corresponding to the current active mode appears (Figure 4 on page 8). After successful authentication, the Welcome to Fingerprint Enrollment window displays (Figure 11 on page 15). 3. Click Next to display the Fingerprint Selection window. 4. To add a new fingerprint, select it and scan it as described in steps 6 to 8 of Enrolling Fingerprints. To delete a fingerprint, select it and click Next as shown in Figure 16. Note: You can only add or delete ONE fingerprint at a time before clicking Next to return to the Fingerprint Selection window. Figure 16: Fingerprint Selection (Fingerprints Already Enrolled) 5. When you have finished, click Next without selecting a fingerprint 6. Click Finish, then OK to close the enrollment wizard.

25 20 Using the.net Bio Solution Logging on to Windows XP in Fingerprint-Only Mode Now that the card is set to operate in Fingerprint only mode, and you have already enrolled fingerprints on the card, the logon process is as follows: 1. Insert the smart card into your smart card reader. The Fingerprint Verification window appears as shown in the following figure: Figure 17: Fingerprint Verification 2. Swipe your finger on your fingerprint sensor for verification. 3. The fingerprint captured is matched against the one previously enrolled on the card. If the match is positive, the logon proceeds. If the match is unsuccessful, an error message is returned and you are prompted to retry.

26 Using the.net Bio Solution 21 Logging on to Windows XP in PIN-or-Fingerprint Mode To change to this mode, follow the instructions in Changing the User Verification Mode on page 12. If the card is set to operate in PIN OR Fingerprint mode, the logon process is as follows: 1. Insert the smart card into your smart card reader. The PIN or Fingerprint Verification window appears as shown in the following figure: Figure 18: PIN or Fingerprint Verification 2. You can either choose to swipe your finger on the fingerprint sensor or enter the smart card PIN through the keyboard. 3. The credential presented PIN or fingerprint is matched against the one previously enrolled on the card. If the match is positive, the logon proceeds. If the match is unsuccessful, an error message is returned and you are prompted to retry. Note: In PIN or Fingerprint mode, if one of the user verification methods is blocked, you can still authenticate using the other method.

27 22 Using the.net Bio Solution Logging on to Windows XP in PIN-and-Fingerprint Mode To change to this mode, follow the instructions in Changing the User Verification Mode on page 12. If the card is set to operate in PIN AND Fingerprint mode, the logon process is as follows: 1. Insert the smart card into your smart card reader. The PIN AND Fingerprint Verification window appears as shown in the following figure: Figure 19: PIN or Fingerprint Verification 2. In this scenario, both the smart card PIN and a fingerprint are presented. The fingerprint is presented first. Once the fingerprint is captured, the PIN prompt is displayed. Type the PIN using the keyboard and click OK). 3. The PIN and fingerprint are matched against those previously enrolled on the card. If the matches are positive, the logon proceeds. If the match is unsuccessful, an error message is returned and you are prompted to retry. Note: In PIN or Fingerprint mode, if one of the user verification methods is blocked, you cannot authenticate using the other method. You must unblock the blocked method first.

28 Using the.net Bio Solution 23 Locking/Unlocking the System The.NET Bio solution can also be used to unlock the system. To lock a computer (instead of logging off), press Ctrl+Alt+Del to display the Windows Security window (see following figure), and then select Lock Computer. Figure 20 Secure Desktop (Windows Security Window) Removal of the smart card can also lock the computer if this option has been set as global policy or local computer Policy (Control Panel > Administration Tools > Local Security Policy > Local Policies > Security Options / interactive Logon: Smart Card removal behavior) Unlocking your computer with the.net Bio solution works the same way as a secure logon. Upon successful verification of the smart card PIN, fingerprint(s) or both, the session is unlocked and you return to the XP desktop in its previous state.

29 24 Using the.net Bio Solution Unblocking Biometrics The card manages 2 separate counters for consecutive unsuccessful PIN verification attempts and for consecutive unsuccessful fingerprint verification attempts. It also manages 2 of the configurable parameters of the.net Bio solution: the maximum values that each counter can reach. The.NET Bio verification interface informs the user of the remaining attempts after each unsuccessful try. Figure 21: Retry counter After a successful authentication, the corresponding counter is reset. However, if you perform too many unsuccessful consecutive attempts, the corresponding authentication method is blocked. To unblock the fingerprint counter: 1. Double-click the icon to start the Biometrics & PIN Manager as shown in Figure In the Biometrics & PIN Manager, click Unblock Biometrics. In the Administrator Authentication dialog, ask the administrator for the corresponding 16-digit response and enter it as shown in Figure 22. Figure 22: Admin Authentication (Challenge-Response) 16-digit challenge provided by the card 16-digit response presented by user

30 Using the.net Bio Solution After successful presentation of the response, you are asked to reenroll fingerprints (Figure 12). Note: You are always asked to provide a response to the 16-digit challenge, regardless of whether the Fingerprint Management Access Condition parameter is set to admin or pin. Unblocking Biometrics via the PIN From version of the minidriver onwards, an option is available where unblocking the PIN automatically unblocks the biometrics authentication at the same time. This is done by setting the configurable Unblock FP when unblock PIN parameter to 1. Using.NET Bio Verification with Smart Card-enabled Applications.NET Bio can be used by many applications that run in the XP desktop, including MS Outlook for signature and encryption, and MS Word and Excel for digital signature of documents. It can also be used with VPN clients for secure remote authentication. Digital signatures are valuable for proving that you signed the contents of a document or message and that the contents have not been altered in transit. This is called nonrepudiation. For additional privacy, you can also encrypt documents and messages. The message contents are encrypted using the shared digital certificates of both the sender and the recipient. If an application works on XP and provides support for Microsoft s Smart Card Cryptographic Service Provider architecture, then the standard smart card PIN prompt can be replaced by the corresponding.net Bio fingerprint verification prompt. For detailed information on using smart cards for two-factor authentication, digital signatures and encryption with different applications, refer to the application documentation. The following examples show how.net Bio can be used for digital signature of in Outlook, and secure remote access with a VPN. Applying a Digital Signature to an using MS Outlook To digitally sign an message with the.net Bio solution: 1. When creating the message, go to Message Options / Security Settings and select Add digital signature to this message. Then select the digital certificate stored on the card as the one to use to sign the message. 2. Complete your message and click Send. The security dialog box corresponding to the current user verification mode of your card appears.

31 26 Using the.net Bio Solution Figure 23: MS Outlook - Sign 3. Swipe your finger and/or enter your PIN, and then click OK. If the credentials match the ones stored on the card, your digitally signed message is sent to the recipient(s). Accessing a VPN Network The.NET Bio solution can be used with many VPN clients for certificate-based authentication with remote access systems. Using the VPN client interface, the location of the digital certificate on the Gemalto.NET Bio smart card is specified first. To access a VPN network using the.net Bio solution: 1. Using your VPN client software, connect to the VPN network as follows. (The smart card should already be in the smart card reader.) From the Start, choose Settings > Control Panel > Network and Internet Connections > Network Connections to display the Network Connections window in the following figure:

32 Using the.net Bio Solution 27 Figure 24: Network Connections Window 2. In Virtual Private Network, double-click the VPN to which you want to connect (Gemalto in this example) 3. Swipe your finger and/or enter your PIN according to the active user verification mode (Figure 4 on page 8) then click OK. The PC connects to the VPN as shown. 4. When Windows XP confirms that you have made a secure VPN connection. Click OK.

IDGo 800 Minidriver for Windows. User Guide

IDGo 800 Minidriver for Windows. User Guide IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the

More information

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned

More information

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista nicolas.bataille@gemalto.com hassen.frikha@gemalto.com November 2007 www.gemalto.com All information herein

More information

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

Application Note. Gemalto s SA Server and OpenLDAP

Application Note. Gemalto s SA Server and OpenLDAP Application Note Gemalto s SA Server and OpenLDAP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall

More information

Application Note. SA Server and ADAM

Application Note. SA Server and ADAM Application Note SA Server and ADAM Solution Overview All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and

More information

SafeNet Cisco AnyConnect Client. Configuration Guide

SafeNet Cisco AnyConnect Client. Configuration Guide SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and

More information

Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only

Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only Application Note Citrix Presentation Server through a Citrix Web Interface with OTP only ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

SA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover

SA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover SA Server 2.0 Application Note : Evidian SafeKit 7.0.4, Failover ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Application Note. Gemalto Smart Cards with Citrix XenApp 5.0

Application Note. Gemalto Smart Cards with Citrix XenApp 5.0 Application Note Gemalto Smart Cards with Citrix XenApp 5.0 ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com

epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian

More information

How To Connect Checkpoint To Gemalto Sa Server With A Checkpoint Vpn And Connect To A Check Point Wifi With A Cell Phone Or Ipvvv On A Pc Or Ipa (For A Pbv) On A Micro

How To Connect Checkpoint To Gemalto Sa Server With A Checkpoint Vpn And Connect To A Check Point Wifi With A Cell Phone Or Ipvvv On A Pc Or Ipa (For A Pbv) On A Micro Application Note: Integrate Check Point IPSec or SSL VPN with Gemalto SA Server SASolutions@gemalto.com January 2008 www.gemalto.com All information herein is either public information or is the property

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

SafeNet Authentication Service Token Validator Proxy Agent. Configuration Guide

SafeNet Authentication Service Token Validator Proxy Agent. Configuration Guide SafeNet Authentication Service Token Validator Proxy Agent Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

Microsoft Windows Server 2003 Integration Guide

Microsoft Windows Server 2003 Integration Guide 15370 Barranca Parkway Irvine, CA 92618 USA Microsoft Windows Server 2003 Integration Guide 2008 HID Global Corporation. All rights reserved. 47A3-905, A.1 C200 and C700 December 1, 2008 Crescendo Integration

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

HP ProtectTools User Guide

HP ProtectTools User Guide HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

SafeNet Authentication Service Agent for Windows Logon. Configuration Guide

SafeNet Authentication Service Agent for Windows Logon. Configuration Guide SafeNet Authentication Service Agent for Windows Logon Configuration Guide All information herein is either public information or is the property of and owned solely by SafeNet Inc. and/or its subsidiaries

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

CA VPN Client. User Guide for Windows 1.0.2.2

CA VPN Client. User Guide for Windows 1.0.2.2 CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

Aras Innovator.NET Client Security Policy Configuration

Aras Innovator.NET Client Security Policy Configuration Aras Innovator.NET Client Security Policy Configuration Aras Innovator 9.1 Document #: 9.1.009022008 Last Modified: 3/17/2009 Aras Corporation ARAS CORPORATION Copyright 2009 Aras Corporation 300 Brickstone

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to

More information

SafeNet Authentication Client (Windows)

SafeNet Authentication Client (Windows) SafeNet Authentication Client (Windows) Version 8.1 SP1 Revision A User s Guide Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe

More information

IBM Lotus Protector for Mail Encryption

IBM Lotus Protector for Mail Encryption IBM Lotus Protector for Mail Encryption for Windows User's Guide 2.1.1 Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.1. Released

More information

System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation

System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation Contents System Requirements... 3 Installation... 3 Microsoft SQL Express 2008 R2 Installation... 3 Microsoft.NET Framework 4.0 Installation... 7 InFocus Management Tool Installation... 8 Log In... 10

More information

BlackShield Authentication Service

BlackShield Authentication Service BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

BES10 Self-Service. Version: 10.2. User Guide

BES10 Self-Service. Version: 10.2. User Guide BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

PROXKey Tool User Manual

PROXKey Tool User Manual PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

IPSec VPN Client Installation Guide. Version 4

IPSec VPN Client Installation Guide. Version 4 IPSec VPN Client Installation Guide Version 4 Document version - 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,

More information

Self Help Guides. Setup Exchange Email with Outlook

Self Help Guides. Setup Exchange Email with Outlook Self Help Guides Setup Exchange Email with Outlook Setting up Exchange Email Connection This document is to be used as a guide to setting up an Exchange Email connection with Outlook; 1. Microsoft Outlook

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and

More information

User Guide. BES12 Self-Service

User Guide. BES12 Self-Service User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5

More information

IBM Lotus Protector for Mail Encryption. User's Guide

IBM Lotus Protector for Mail Encryption. User's Guide IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

AD Self-Service Suite for Active Directory

AD Self-Service Suite for Active Directory The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.

More information

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your

More information

FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2011.1

FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2011.1 FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2011.1 2011 Sage Software, Inc. All rights reserved. Published by Sage 2325 Dulles Corner

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System

STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System Abstract The intention of this document is to ensure successful installation of 3rd-Party software required for

More information

VPN Client User s Guide. 9235966 Issue 2

VPN Client User s Guide. 9235966 Issue 2 VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the

More information

HP ProtectTools User Guide

HP ProtectTools User Guide HP ProtectTools User Guide Copyright 2009 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Java is a US trademark

More information

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Client User's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 4 About This Document 4 NetIQ Advanced Authentication Framework Overview

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

Endpoint Security VPN for Windows 32-bit/64-bit

Endpoint Security VPN for Windows 32-bit/64-bit Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9243054 Issue 1 Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation VPN Client User s Guide 9243054 Issue 1 Reproduction, transfer, distribution or storage of part or all of

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

Application Note: Integrate Cisco IPSec or SSL VPN with Gemalto SA Server. SASolutions@gemalto.com January 2008. www.gemalto.com

Application Note: Integrate Cisco IPSec or SSL VPN with Gemalto SA Server. SASolutions@gemalto.com January 2008. www.gemalto.com Application Note: Integrate Cisco IPSec or SSL VPN with Gemalto SA Server SASolutions@gemalto.com January 2008 www.gemalto.com All information herein is either public information or is the property of

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual

Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual Contents For AP v2.10.0.0 Release For Windows 98/ME/2000/XP Version 1.1B (08/27/2004) Contents...1 Introduction...1 Features & Specifications...2

More information

Gemalto SafeNet Minidriver 9.0

Gemalto SafeNet Minidriver 9.0 SafeNet Authentication Client Gemalto SafeNet Minidriver 9.0 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document

More information

Microsoft Dynamics GP 2010. SQL Server Reporting Services Guide

Microsoft Dynamics GP 2010. SQL Server Reporting Services Guide Microsoft Dynamics GP 2010 SQL Server Reporting Services Guide April 4, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information

More information

Remote Management System

Remote Management System RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

QUICK GUIDE FOR. Installing Nokia Connectivity Cable Drivers

QUICK GUIDE FOR. Installing Nokia Connectivity Cable Drivers QUICK GUIDE FOR Installing Nokia Connectivity Cable Drivers Contents 1. Introduction...1 2. Must haves...1 3. Installing Nokia Connectivity Cable Drivers...1 3.1 Before installation...1 3.2 Installing

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Welcome Guide for MP-1 Token for Microsoft Windows

Welcome Guide for MP-1 Token for Microsoft Windows Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Smart Card Two Factor Authentication

Smart Card Two Factor Authentication January 2013 Page 1 Smart Card Two Factor Authentication The combination of a smart card and PIN provides Two-Factor Authentication, where two items are needed: something physical the user has (a smart

More information

Software Token. Installation and User Guide. 2013 MasterCard Proprietary. All rights reserved.

Software Token. Installation and User Guide. 2013 MasterCard Proprietary. All rights reserved. Software Token Installation and User Guide 2013 MasterCard Proprietary. All rights reserved. Contents Overview... 1 Install the RSA Client Desktop Application... 1 Download and Save the RSA Desktop Application...

More information

Using Entrust certificates with Microsoft Office and Windows

Using Entrust certificates with Microsoft Office and Windows Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com

More information

Sage 100 ERP. Installation and System Administrator s Guide

Sage 100 ERP. Installation and System Administrator s Guide Sage 100 ERP Installation and System Administrator s Guide This is a publication of Sage Software, Inc. Version 2014 Copyright 2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the

More information

Microsoft Dynamics GP. Electronic Signatures

Microsoft Dynamics GP. Electronic Signatures Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2006 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without

More information

INSTALLATION GUIDE. AXIS Camera Station

INSTALLATION GUIDE. AXIS Camera Station INSTALLATION GUIDE AXIS Camera Station About this Guide This guide is intended for administrators and users of the AXIS Camera Station, and is applicable for software release 3.50 and later. It covers

More information

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1 Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Enterprise Single Sign-On 8.0.3 User Guide

Enterprise Single Sign-On 8.0.3 User Guide Enterprise Single Sign-On 8.0.3 User Guide Advanced Login for Windows Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary information protected

More information

HP ProtectTools. Getting Started

HP ProtectTools. Getting Started HP ProtectTools Getting Started Copyright 2012 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Intel is a trademark

More information

NetBak Replicator 4.0 User Manual Version 1.0

NetBak Replicator 4.0 User Manual Version 1.0 NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...

More information

Entrust Certificate Services for Adobe CDS

Entrust Certificate Services for Adobe CDS Entrust Certificate Services Entrust Certificate Services for Adobe CDS Getting Started Guide Entrust SafeNet Authentication Client: 8.3 Date of issue: July 2015 Document issue: 3.0 Revisions Issue and

More information

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services

More information

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

Strong Authentication for Microsoft TS Web / RD Web

Strong Authentication for Microsoft TS Web / RD Web Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

New Security Features

New Security Features New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing

More information