HP Dc5800 HP Protect Tools Guide - Page 4

Embedded Security for HP ProtectTools, Removing an application from Single Sign

Page 4 highlights

Using manual (drag and drop) registration 17 Managing applications and credentials 17 Modifying application properties 17 Removing an application from Single Sign On 17 Exporting an application 18 Importing an application 18 Modifying credentials 18 Using Application Protection 19 Restricting access to an application 19 Removing protection from an application 19 Changing restriction settings for a protected application 19 Advanced tasks (administrator only 21 Specifying how users and administrators log on 21 Configuring custom authentication requirements 21 Configuring credential properties 22 Configuring Credential Manager settings 22 Example 1-Using the "Advanced Settings" page to allow Windows logon from Credential Manager 23 Example 2-Using the "Advanced Settings" page to require user verification before Single Sign On 23 3 Embedded Security for HP ProtectTools Setup procedures ...25 Enabling the embedded security chip 25 Initializing the embedded security chip 25 Setting up the basic user account 26 General tasks ...27 Using the Personal Secure Drive 27 Encrypting files and folders 27 Sending and receiving encrypted e-mail 27 Changing the Basic User Key password 27 Advanced tasks ...28 Backing up and restoring 28 Creating a backup file 28 Restoring certification data from the backup file 28 Changing the owner password 28 Resetting a user password 28 Enabling and disabling Embedded Security 28 Permanently disabling Embedded Security 29 Enabling Embedded Security after permanent disable 29 Migrating keys with the Migration Wizard 29 4 Java Card Security for HP ProtectTools General tasks ...31 Changing a Java Card PIN 31 Selecting the card reader 31 Advanced tasks (administrators only 32 Assigning a Java Card PIN 32 Assigning a name to a Java Card 32 Setting power-on authentication 32 Enabling Java Card power-on authentication and creating an administrator Java Card ...33 Creating a user Java Card 33 iv

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72

Using manual (drag and drop) registration
.......................................
17
Managing applications and credentials
.............................................................
17
Modifying application properties
.......................................................
17
Removing an application from Single Sign On
.................................
17
Exporting an application
...................................................................
18
Importing an application
...................................................................
18
Modifying credentials
........................................................................
18
Using Application Protection
..............................................................................................
19
Restricting access to an application
..................................................................
19
Removing protection from an application
..........................................................
19
Changing restriction settings for a protected application
..................................
19
Advanced tasks (administrator only)
..................................................................................................
21
Specifying how users and administrators log on
...............................................................
21
Configuring custom authentication requirements
..............................................................
21
Configuring credential properties
.......................................................................................
22
Configuring Credential Manager settings
..........................................................................
22
Example 1—Using the “Advanced Settings” page to allow Windows logon
from Credential Manager
..................................................................................
23
Example 2—Using the “Advanced Settings” page to require user verification
before Single Sign On
.......................................................................................
23
3
Embedded Security for HP ProtectTools
Setup procedures
...............................................................................................................................
25
Enabling the embedded security chip
................................................................................
25
Initializing the embedded security chip
..............................................................................
25
Setting up the basic user account
......................................................................................
26
General tasks
.....................................................................................................................................
27
Using the Personal Secure Drive
.......................................................................................
27
Encrypting files and folders
................................................................................................
27
Sending and receiving encrypted e-mail
............................................................................
27
Changing the Basic User Key password
...........................................................................
27
Advanced tasks
..................................................................................................................................
28
Backing up and restoring
...................................................................................................
28
Creating a backup file
.......................................................................................
28
Restoring certification data from the backup file
...............................................
28
Changing the owner password
..........................................................................................
28
Resetting a user password
................................................................................................
28
Enabling and disabling Embedded Security
......................................................................
28
Permanently disabling Embedded Security
......................................................
29
Enabling Embedded Security after permanent disable
.....................................
29
Migrating keys with the Migration Wizard
..........................................................................
29
4
Java Card Security for HP ProtectTools
General tasks
.....................................................................................................................................
31
Changing a Java Card PIN
................................................................................................
31
Selecting the card reader
...................................................................................................
31
Advanced tasks (administrators only)
................................................................................................
32
Assigning a Java Card PIN
................................................................................................
32
Assigning a name to a Java Card
......................................................................................
32
Setting power-on authentication
........................................................................................
32
Enabling Java Card power-on authentication and creating an administrator
Java Card
..........................................................................................................
33
Creating a user Java Card
................................................................................
33
iv