Using manual (drag and drop) registration
.......................................
19
Managing applications and credentials
.............................................................
19
Modifying application properties
.......................................................
19
Removing an application from Single Sign On
.................................
19
Exporting an application
...................................................................
19
Importing an application
...................................................................
20
Modifying credentials
........................................................................
20
Using Application Protection
..............................................................................................
20
Restricting access to an application
..................................................................
21
Removing protection from an application
..........................................................
21
Changing restriction settings for a protected application
..................................
21
Advanced tasks (administrator only)
..................................................................................................
23
Specifying how users and administrators log on
...............................................................
23
Configuring custom authentication requirements
..............................................................
24
Configuring credential properties
.......................................................................................
24
Configuring Credential Manager settings
..........................................................................
25
Example 1—Using the “Advanced Settings” page to allow Windows logon
from Credential Manager
..................................................................................
25
Example 2—Using the “Advanced Settings” page to require user verification
before Single Sign On
.......................................................................................
26
3
Embedded Security for HP ProtectTools
Setup procedures
...............................................................................................................................
28
Enabling the embedded security chip
................................................................................
28
Initializing the embedded security chip
..............................................................................
29
Setting up the basic user account
......................................................................................
30
General tasks
.....................................................................................................................................
31
Using the Personal Secure Drive
.......................................................................................
31
Encrypting files and folders
................................................................................................
31
Sending and receiving encrypted e-mail
............................................................................
31
Changing the Basic User Key password
...........................................................................
32
Advanced tasks
..................................................................................................................................
33
Backing up and restoring
...................................................................................................
33
Creating a backup file
.......................................................................................
33
Restoring certification data from the backup file
...............................................
33
Changing the owner password
..........................................................................................
34
Resetting a user password
................................................................................................
34
Enabling and disabling Embedded Security
......................................................................
34
Permanently disabling Embedded Security
......................................................
34
Enabling Embedded Security after permanent disable
.....................................
34
Migrating keys with the Migration Wizard
..........................................................................
35
4
Java Card Security for HP ProtectTools
General tasks
.....................................................................................................................................
37
Changing a Java Card PIN
................................................................................................
37
Selecting the card reader
...................................................................................................
37
Advanced tasks (administrators only)
................................................................................................
38
Assigning a Java Card PIN
................................................................................................
38
Assigning a name to a Java Card
......................................................................................
39
Setting power-on authentication
........................................................................................
39
Enabling Java Card power-on authentication and creating an administrator
Java Card
..........................................................................................................
40
Creating a user Java Card
................................................................................
41
iv
ENWW