Using manual (drag and drop) registration
.......................................
17
Managing applications and credentials
.............................................................
17
Modifying application properties
.......................................................
17
Removing an application from Single Sign On
.................................
17
Exporting an application
...................................................................
18
Importing an application
...................................................................
18
Modifying credentials
........................................................................
18
Using Application Protection
..............................................................................................
19
Restricting access to an application
..................................................................
19
Removing protection from an application
..........................................................
19
Changing restriction settings for a protected application
..................................
19
Advanced tasks (administrator only)
..................................................................................................
21
Specifying how users and administrators log on
...............................................................
21
Configuring custom authentication requirements
..............................................................
21
Configuring credential properties
.......................................................................................
22
Configuring Credential Manager settings
..........................................................................
22
Example 1—Using the “Advanced Settings” page to allow Windows logon
from Credential Manager
..................................................................................
23
Example 2—Using the “Advanced Settings” page to require user verification
before Single Sign On
.......................................................................................
23
3
Embedded Security for HP ProtectTools
Setup procedures
...............................................................................................................................
25
Enabling the embedded security chip
................................................................................
25
Initializing the embedded security chip
..............................................................................
25
Setting up the basic user account
......................................................................................
26
General tasks
.....................................................................................................................................
27
Using the Personal Secure Drive
.......................................................................................
27
Encrypting files and folders
................................................................................................
27
Sending and receiving encrypted e-mail
............................................................................
27
Changing the Basic User Key password
...........................................................................
27
Advanced tasks
..................................................................................................................................
28
Backing up and restoring
...................................................................................................
28
Creating a backup file
.......................................................................................
28
Restoring certification data from the backup file
...............................................
28
Changing the owner password
..........................................................................................
28
Resetting a user password
................................................................................................
28
Enabling and disabling Embedded Security
......................................................................
28
Permanently disabling Embedded Security
......................................................
29
Enabling Embedded Security after permanent disable
.....................................
29
Migrating keys with the Migration Wizard
..........................................................................
29
4
Java Card Security for HP ProtectTools
General tasks
.....................................................................................................................................
31
Changing a Java Card PIN
................................................................................................
31
Selecting the card reader
...................................................................................................
31
Advanced tasks (administrators only)
................................................................................................
32
Assigning a Java Card PIN
................................................................................................
32
Assigning a name to a Java Card
......................................................................................
32
Setting power-on authentication
........................................................................................
32
Enabling Java Card power-on authentication and creating an administrator
Java Card
..........................................................................................................
33
Creating a user Java Card
................................................................................
33
iv