Symantec 14541094 Administration Guide - Page 93
Leveraging centralized authentication in pcAnywhere, Using two-factor authentication
UPC - 037648640480
View all Symantec 14541094 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 93 highlights
Managing security in Symantec pcAnywhere 93 Controlling access to pcAnywhere hosts 4 Repeat steps 2 and 3 for each computer name or IP address from which you want to allow connections. 5 Click OK. Leveraging centralized authentication in pcAnywhere Symantec pcAnywhere requires you to create a caller logon account for each remote user or user group who connects to the host computer and to select an authentication method for verifying the user's identity. This information is required for all host sessions to prevent unauthorized access. Symantec pcAnywhere supports a number of centralized authentication types, including Active Directory, Novell Directory Services, Novell Bindery, NT, and RSA SecurID, giving you the flexibility of using the authentication measures already in place on your network. Using two-factor authentication Symantec pcAnywhere supports RSA SecurID two-factor authentication. SecurID validates users against a security code which is generated by an authenticator, and a user-provided PIN. You must have the RSA ACE/Server and Agents properly installed and configured on your network. For more information, visit the RSA Web site at the following URL: www.rsa.com To implement SecurID in pcAnywhere, you must do the following: ■ Install and configure the RSA ACE/Agent on the host computer. For more information, see the documentation provided by RSA. ■ On the host computer, open pcAnywhere and configure a host connection item to use SecurID authentication. For more information, see the Symantec pcAnywhere User's Guide. When a remote user attempts to connect to a host computer that uses SecurID authentication, the user is prompted for authentication credentials which include a PIN number, logon name, and passcode. The host computer handles the data requests between the remote computer and the RSA ACE/Agent, which is installed on the host computer. The RSA ACE/Agent handles the data requests between the host computer and the RSA ACE/Server. If the tokencode that is provided by the remote user is out of sync with the server clock or appears to be compromised, the user is prompted for another tokencode.