HP Nx7400 ProtectTools (Select Models Only) - Windows Vista - Page 5

Device Access Manager for HP ProtectTools, Logging on to Windows with Credential Manager - manual

Page 5 highlights

Registering credentials ...46 Registering fingerprints 46 Setting up the fingerprint reader 47 Using your registered fingerprint to log on to Windows 47 Registering a Java Card, smart card, token, or virtual token 47 Registering a USB eToken 48 Registering other credentials 48 General tasks ...49 Creating a virtual token ...49 Changing the Windows logon password 49 Changing a token PIN ...50 Managing identity ...50 Backing up an identity 50 Restoring an Identity 51 Clearing an identity from the system 51 Locking the computer ...52 Using Windows Logon ...52 Logging on to Windows with Credential Manager 52 Adding an account 53 Removing an account 53 Using Single Sign On ...53 Registering a new application 53 Using automatic registration 54 Using manual (drag and drop) registration 54 Managing applications and credentials 55 Modifying application properties 55 Removing an application from Single Sign On 55 Exporting an application 55 Importing an application 56 Modifying credentials 56 Using Application Protection 57 Restricting access to an application 57 Removing protection from an application 57 Changing restriction settings for a protected application 58 Advanced tasks (administrator only 59 Specifying how users and administrators log on 59 Configuring custom authentication requirements 60 Configuring credential properties 60 Configuring Credential Manager settings 61 Example 1-Using the "Advanced Settings" page to allow Windows logon from Credential Manager 61 Example 2-Using the "Advanced Settings" page to require user verification before Single Sign On 62 7 Device Access Manager for HP ProtectTools Starting background service ...64 Simple configuration ...65 Device class configuration (advanced 66 Adding a user or a group 66 Removing a user or a group 66 ENWW v

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78

Registering credentials
......................................................................................................
46
Registering fingerprints
.....................................................................................
46
Setting up the fingerprint reader
.......................................................
47
Using your registered fingerprint to log on to Windows
....................
47
Registering a Java Card, smart card, token, or virtual token
............................
47
Registering a USB eToken
................................................................................
48
Registering other credentials
............................................................................
48
General tasks
.....................................................................................................................................
49
Creating a virtual token
......................................................................................................
49
Changing the Windows logon password
............................................................................
49
Changing a token PIN
........................................................................................................
50
Managing identity
...............................................................................................................
50
Backing up an identity
.......................................................................................
50
Restoring an Identity
.........................................................................................
51
Clearing an identity from the system
.................................................................
51
Locking the computer
........................................................................................................
52
Using Windows Logon
.......................................................................................................
52
Logging on to Windows with Credential Manager
.............................................
52
Adding an account
............................................................................................
53
Removing an account
.......................................................................................
53
Using Single Sign On
.........................................................................................................
53
Registering a new application
...........................................................................
53
Using automatic registration
.............................................................
54
Using manual (drag and drop) registration
.......................................
54
Managing applications and credentials
.............................................................
55
Modifying application properties
.......................................................
55
Removing an application from Single Sign On
.................................
55
Exporting an application
...................................................................
55
Importing an application
...................................................................
56
Modifying credentials
........................................................................
56
Using Application Protection
..............................................................................................
57
Restricting access to an application
..................................................................
57
Removing protection from an application
..........................................................
57
Changing restriction settings for a protected application
..................................
58
Advanced tasks (administrator only)
..................................................................................................
59
Specifying how users and administrators log on
...............................................................
59
Configuring custom authentication requirements
..............................................................
60
Configuring credential properties
.......................................................................................
60
Configuring Credential Manager settings
..........................................................................
61
Example 1—Using the “Advanced Settings” page to allow Windows logon
from Credential Manager
..................................................................................
61
Example 2—Using the “Advanced Settings” page to require user verification
before Single Sign On
.......................................................................................
62
7
Device Access Manager for HP ProtectTools
Starting background service
...............................................................................................................
64
Simple configuration
...........................................................................................................................
65
Device class configuration (advanced)
...............................................................................................
66
Adding a user or a group
...................................................................................................
66
Removing a user or a group
..............................................................................................
66
ENWW
v