Lenovo 8741C5U User Manual - Page 43

uthenticate

Page 43 highlights

established. If the selected certificate is valid, the logon ID that appears on the certificate is entered automatically in the Logon name field. Authenticate as computer when computer information is available If you are using an IBM wireless adapter, you can use machine certification for the authentication. To do this, select the Authenticate as computer when computer information is available check box; then proceed with configuring the settings without specifying the client certificate. Save the configured profile. The connection will be based entirely on the information in the computer certificate. If you specify the client certification and also select the Authenticate as computer when computer information is available check box, both the computer certificate and the client certificate will be authenticated. You can use computer certification to log on to the network domain. When EAP authentication is set to TTLS: Validate server certificate If the server certificate must be verified, select the check box for Validate server certificate, and specify the certificate of a reliable route certificate issuer. If the server name belongs to a specific domain, specify the domain name in the server name field. If the server certificate does not need to be verified, leave the Validate server certificate check box blank. The application will not check the reliability of the server, and the connection will not be tightly secured. Roaming type In the Roaming type field, enter the user account name that is already registered on Func Software Odyssey Server. This should be the name specified in the user ID field of the Tunnel authentication setting. Tunnel authentication MS-CHAP-V2 is the protocol available for the Tunnel authentication. The following settings can be configured by the user (for the user name, enter the same name as the one specified in the Roaming type field). Use Windows logon name and password The user ID and password used for Windows logon will be used for tunnel authentication as well. This setting is valid for activating the Single sign-on function, which authenticates EAP-TTLS by use of the user ID and password for Windows logon. To enable this setting, go to Option, and select the check box for Use Windows logon user name and password to authenticate the wireless network. Tunnel authentication and logon to the domain server will be processed simultaneously. For Thinkpad computers that support the use of fingerprint reader to log on to Windows, the wireless network authentication will be processed automatically. Use temporary user ID and password If you select this setting, a message will be displayed when you deploy this location profile, asking you to enter the user ID and password for tunnel authentication. After you enter the necessary information, the authentication will start. This option is used to connect to the wireless network manually. Chapter 2. Using location profiles 33

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100

established.
If
the
selected
certificate
is
valid,
the
logon
ID
that
appears
on
the
certificate
is
entered
automatically
in
the
Logon
name
field.
Authenticate
as
computer
when
computer
information
is
available
If
you
are
using
an
IBM
wireless
adapter,
you
can
use
machine
certification
for
the
authentication.
To
do
this,
select
the
Authenticate
as
computer
when
computer
information
is
available
check
box;
then
proceed
with
configuring
the
settings
without
specifying
the
client
certificate.
Save
the
configured
profile.
The
connection
will
be
based
entirely
on
the
information
in
the
computer
certificate.
If
you
specify
the
client
certification
and
also
select
the
A
uthenticate
as
computer
when
computer
information
is
available
check
box,
both
the
computer
certificate
and
the
client
certificate
will
be
authenticated.
You
can
use
computer
certification
to
log
on
to
the
network
domain.
When
EAP
authentication
is
set
to
TTLS:
Validate
server
certificate
If
the
server
certificate
must
be
verified,
select
the
check
box
for
Validate
server
certificate
,
and
specify
the
certificate
of
a
reliable
route
certificate
issuer.
If
the
server
name
belongs
to
a
specific
domain,
specify
the
domain
name
in
the
server
name
field.
If
the
server
certificate
does
not
need
to
be
verified,
leave
the
Validate
server
certificate
check
box
blank.
The
application
will
not
check
the
reliability
of
the
server,
and
the
connection
will
not
be
tightly
secured.
Roaming
type
In
the
Roaming
type
field,
enter
the
user
account
name
that
is
already
registered
on
Func
Software
Odyssey
Server.
This
should
be
the
name
specified
in
the
user
ID
field
of
the
Tunnel
authentication
setting.
Tunnel
authentication
MS-CHAP-V2
is
the
protocol
available
for
the
Tunnel
authentication.
The
following
settings
can
be
configured
by
the
user
(for
the
user
name,
enter
the
same
name
as
the
one
specified
in
the
Roaming
type
field).
Use
Windows
logon
name
and
password
The
user
ID
and
password
used
for
Windows
logon
will
be
used
for
tunnel
authentication
as
well.
This
setting
is
valid
for
activating
the
Single
sign-on
function,
which
authenticates
EAP-TTLS
by
use
of
the
user
ID
and
password
for
Windows
logon.
To
enable
this
setting,
go
to
Option,
and
select
the
check
box
for
Use
Windows
logon
user
name
and
password
to
authenticate
the
wireless
network.
Tunnel
authentication
and
logon
to
the
domain
server
will
be
processed
simultaneously.
For
Thinkpad
computers
that
support
the
use
of
fingerprint
reader
to
log
on
to
Windows,
the
wireless
network
authentication
will
be
processed
automatically.
Use
temporary
user
ID
and
password
If
you
select
this
setting,
a
message
will
be
displayed
when
you
deploy
this
location
profile,
asking
you
to
enter
the
user
ID
and
password
for
tunnel
authentication.
After
you
enter
the
necessary
information,
the
authentication
will
start.
This
option
is
used
to
connect
to
the
wireless
network
manually.
Chapter
2.
Using
location
profiles
33