Removing an account
.......................................................................................
18
Using Single Sign On
.........................................................................................................
18
Registering a new application
...........................................................................
18
Using automatic registration
.............................................................
18
Using manual (drag and drop) registration
.......................................
19
Managing applications and credentials
.............................................................
19
Modifying application properties
.......................................................
19
Removing an application from Single Sign On
.................................
19
Exporting an application
...................................................................
20
Importing an application
...................................................................
20
Modifying credentials
........................................................................
20
Using Application Protection
..............................................................................................
21
Restricting access to an application
..................................................................
21
Removing protection from an application
..........................................................
21
Changing restriction settings for a protected application
..................................
22
Advanced tasks (administrator only)
..................................................................................................
23
Specifying how users and administrators log on
...............................................................
23
Configuring custom authentication requirements
..............................................................
24
Configuring credential properties
.......................................................................................
24
Configuring Credential Manager settings
..........................................................................
25
Example 1—Using the “Advanced Settings” page to allow Windows logon
from Credential Manager
..................................................................................
25
Example 2—Using the “Advanced Settings” page to require user verification
before Single Sign On
.......................................................................................
26
3
Embedded Security for HP ProtectTools
Setup procedures
...............................................................................................................................
28
Enabling the embedded security chip
................................................................................
28
Initializing the embedded security chip
..............................................................................
29
Setting up the basic user account
......................................................................................
30
General tasks
.....................................................................................................................................
31
Using the Personal Secure Drive
.......................................................................................
31
Encrypting files and folders
................................................................................................
31
Sending and receiving encrypted e-mail
............................................................................
31
Changing the Basic User Key password
...........................................................................
32
Advanced tasks
..................................................................................................................................
33
Backing up and restoring
...................................................................................................
33
Creating a backup file
.......................................................................................
33
Restoring certification data from the backup file
...............................................
33
Changing the owner password
..........................................................................................
34
Resetting a user password
................................................................................................
34
Enabling and disabling Embedded Security
......................................................................
34
Permanently disabling Embedded Security
......................................................
34
Enabling Embedded Security after permanent disable
.....................................
34
Migrating keys with the Migration Wizard
..........................................................................
35
4
Java Card Security for HP ProtectTools
General tasks
.....................................................................................................................................
38
Changing a Java Card PIN
................................................................................................
38
Selecting the card reader
...................................................................................................
38
iv
ENWW