HP 2210b ProtectTools - Windows Vista and Windows XP - Page 4

Embedded Security for HP ProtectTools, Removing an application from Single Sign

Page 4 highlights

Removing an account 18 Using Single Sign On ...18 Registering a new application 18 Using automatic registration 18 Using manual (drag and drop) registration 19 Managing applications and credentials 19 Modifying application properties 19 Removing an application from Single Sign On 19 Exporting an application 20 Importing an application 20 Modifying credentials 20 Using Application Protection 21 Restricting access to an application 21 Removing protection from an application 21 Changing restriction settings for a protected application 22 Advanced tasks (administrator only 23 Specifying how users and administrators log on 23 Configuring custom authentication requirements 24 Configuring credential properties 24 Configuring Credential Manager settings 25 Example 1-Using the "Advanced Settings" page to allow Windows logon from Credential Manager 25 Example 2-Using the "Advanced Settings" page to require user verification before Single Sign On 26 3 Embedded Security for HP ProtectTools Setup procedures ...28 Enabling the embedded security chip 28 Initializing the embedded security chip 29 Setting up the basic user account 30 General tasks ...31 Using the Personal Secure Drive 31 Encrypting files and folders 31 Sending and receiving encrypted e-mail 31 Changing the Basic User Key password 32 Advanced tasks ...33 Backing up and restoring 33 Creating a backup file 33 Restoring certification data from the backup file 33 Changing the owner password 34 Resetting a user password 34 Enabling and disabling Embedded Security 34 Permanently disabling Embedded Security 34 Enabling Embedded Security after permanent disable 34 Migrating keys with the Migration Wizard 35 4 Java Card Security for HP ProtectTools General tasks ...38 Changing a Java Card PIN 38 Selecting the card reader 38 iv ENWW

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90

Removing an account
.......................................................................................
18
Using Single Sign On
.........................................................................................................
18
Registering a new application
...........................................................................
18
Using automatic registration
.............................................................
18
Using manual (drag and drop) registration
.......................................
19
Managing applications and credentials
.............................................................
19
Modifying application properties
.......................................................
19
Removing an application from Single Sign On
.................................
19
Exporting an application
...................................................................
20
Importing an application
...................................................................
20
Modifying credentials
........................................................................
20
Using Application Protection
..............................................................................................
21
Restricting access to an application
..................................................................
21
Removing protection from an application
..........................................................
21
Changing restriction settings for a protected application
..................................
22
Advanced tasks (administrator only)
..................................................................................................
23
Specifying how users and administrators log on
...............................................................
23
Configuring custom authentication requirements
..............................................................
24
Configuring credential properties
.......................................................................................
24
Configuring Credential Manager settings
..........................................................................
25
Example 1—Using the “Advanced Settings” page to allow Windows logon
from Credential Manager
..................................................................................
25
Example 2—Using the “Advanced Settings” page to require user verification
before Single Sign On
.......................................................................................
26
3
Embedded Security for HP ProtectTools
Setup procedures
...............................................................................................................................
28
Enabling the embedded security chip
................................................................................
28
Initializing the embedded security chip
..............................................................................
29
Setting up the basic user account
......................................................................................
30
General tasks
.....................................................................................................................................
31
Using the Personal Secure Drive
.......................................................................................
31
Encrypting files and folders
................................................................................................
31
Sending and receiving encrypted e-mail
............................................................................
31
Changing the Basic User Key password
...........................................................................
32
Advanced tasks
..................................................................................................................................
33
Backing up and restoring
...................................................................................................
33
Creating a backup file
.......................................................................................
33
Restoring certification data from the backup file
...............................................
33
Changing the owner password
..........................................................................................
34
Resetting a user password
................................................................................................
34
Enabling and disabling Embedded Security
......................................................................
34
Permanently disabling Embedded Security
......................................................
34
Enabling Embedded Security after permanent disable
.....................................
34
Migrating keys with the Migration Wizard
..........................................................................
35
4
Java Card Security for HP ProtectTools
General tasks
.....................................................................................................................................
38
Changing a Java Card PIN
................................................................................................
38
Selecting the card reader
...................................................................................................
38
iv
ENWW