HP mt20 Administrator Guide 1 - Page 63

Encryption, Options, Customization Center

Page 63 highlights

Encryption Active Directory credentials and other secrets can be hashed for functions like screen-unlock and/or encrypted and stored on the system for single sign-on. The hash algorithm for creating a password's hash can be selected from this menu. The default, scrypt, is a well-accepted key derivation function. Argon2, another key derivation function is also available, as well as conventional hashes SHA-256 and SHA-512. The advantage of a key derivation function is that it is computationally expensive to compute a rainbow table that matches plain-text passwords to precomputed hash values, whereas conventional hashes are meant to execute as fast as possible. All hashes are stored with 128 or more bits of random salt which changes each time the password hash is computed and stored. Encrypted passwords are used in situations where they can be reversed and supplied to connections when they start (single sign-on). The encryption algorithm can be selected here from a wide variety supported by OpenSSL. Unless there is a good reason to select a different value, HP recommends using the default encryption algorithm, which is generally regarded as a modern, secure algorithm by the security community. The number of salt bits and key bits will vary from one algorithm to another and you can get details by pressing the info button next to the algorithm selector. Encryption keys are unique per thin client and are stored in a place that only administrators can read. Furthermore, only certain authorized applications on the system can do decryption. Both hashes and encrypted secrets can be set with a time-to-live. If the amount of time between when the secret was hashed or encrypted and the time when it is used or decrypted exceeds the time-to-live, the hashmatch or decryption will fail. Options Local user must log in: If this option is selected when Active Directory authentication is disabled, the login screen still appears at startup and logout. In this situation, the local user or root credentials must be used to gain access to the system. Enable secret peek: If enabled, most password and secret entry fields on the system display a small eyeball icon on the right side. When that eyeball icon is selected by pressing and holding down the left mouse button, the secret is displayed in plain text as long as the mouse button is held down. As soon as the button is released, the secret is again obscured. Use domain text entry: If enabled, a separate Domain input field is provided for the domain name where applicable. If disabled, the domain is determined by the value entered in the User field instead. For instance, if the User field contains "mike@mycorp", the domain is assumed to be "mycorp". If the user field is "graycorp \mary", the domain is assumed to be "graycorp". Allow administrators to override screen lock: If enabled, you can override a locked screen and return it to the login screen or ThinPro desktop, just as if the user had manually logged out of the thin client. Customization Center To open Customization Center: ▲ Select Setup > Customization Center in Control Panel. The button at the top of the Desktop page can be used to switch between the ThinPro and Smart Zero configurations. See Choosing an OS configuration on page 2 for more information about the differences between the two configurations. Setup 51

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177

Encryption
Active Directory credentials and other secrets can be hashed for functions like screen-unlock and/or
encrypted and stored on the system for single sign-on.
The hash algorithm for creating a password’s hash can be selected from this menu. The default, scrypt, is a
well-accepted key derivation function. Argon2, another key derivation function is also available, as well as
conventional hashes SHA-256 and SHA-512. The advantage of a key derivation function is that it is
computationally expensive to compute a rainbow table that matches plain-text passwords to precomputed
hash values, whereas conventional hashes are meant to execute as fast as possible. All hashes are stored
with 128 or more bits of random salt which changes each time the password hash is computed and stored.
Encrypted passwords are used in situations where they can be reversed and supplied to connections when
they start (single sign-on). The encryption algorithm can be selected here from a wide variety supported by
OpenSSL. Unless there is a good reason to select a
different
value, HP recommends using the default
encryption algorithm, which is generally regarded as a modern, secure algorithm by the security community.
The number of salt bits and key bits will vary from one algorithm to another and you can get details by
pressing the info button next to the algorithm selector. Encryption keys are unique per thin client and are
stored in a place that only administrators can read. Furthermore, only certain authorized applications on the
system can do decryption.
Both hashes and encrypted secrets can be set with a time-to-live. If the amount of time between when the
secret was hashed or encrypted and the time when it is used or decrypted exceeds the time-to-live, the hash-
match or decryption will fail.
Options
Local user must log in
: If this option is selected when Active Directory authentication is disabled, the login
screen still appears at startup and logout. In this situation, the local user or root credentials must be used to
gain access to the system.
Enable secret peek
: If enabled, most password and secret entry
fields
on the system display a small eyeball
icon on the right side. When that eyeball icon is selected by pressing and holding down the left mouse button,
the secret is displayed in plain text as long as the mouse button is held down. As soon as the button is
released, the secret is again obscured.
Use domain text entry
: If enabled, a separate Domain input
field
is provided for the domain name where
applicable. If disabled, the domain is determined by the value entered in the User
field
instead. For instance, if
the User
field
contains “mike@mycorp”, the domain is assumed to be “mycorp”. If the user
field
is “graycorp
\mary”, the domain is assumed to be “graycorp”.
Allow administrators to override screen lock
: If enabled, you can override a locked screen and return it to
the login screen or ThinPro desktop, just as if the user had manually logged out of the thin client.
Customization Center
To open Customization Center:
Select
Setup > Customization Center
in Control Panel.
The button at the top of the
Desktop
page can be used to switch between the ThinPro and Smart Zero
configurations.
See
Choosing an OS
configuration
on page
2
for more information about the
differences
between the two
configurations.
Setup
51