McAfee OFFICE 3.1 Especificaciones Pagina 103

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 135
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 102
Tokens
| 103
Tokens
This chapter addresses the different authentication tokens that are supported in
Endpoint Encryption for Files and Folders.
Passwords
The most common authentication token is the user password. There are a number of
password quality restrictions that can be imposed on the Endpoint Encryption user
from the Endpoint Encryption Manager, e.g. minimum length, content, change
intervals etc. Please consult the Endpoint Encryption Manager Administrator’s Guide
for details about user password quality restrictions.
For user local keys and Self-Extractors the same password rules apply as specified in
the user’s Endpoint Encryption password policy, i.e. the restrictions imposed on the
user, in the Endpoint Encryption Manager, also apply for user local keys and Self-
Extractor passwords.
USB tokens
The following USB authentication tokens are directly supported by Endpoint Encryption
for Files and Folders, i.e. without using the Generic PKI token (see below).
Aladdin eToken 32 MB and 64 MB
SafeNet iKey
RSA SID800
The USB tokens can be used either with or without digital certificates for
authentication.
The list of supported USB tokens is continuously updated. Please consult your Endpoint
Encryption representative for the latest list of supported tokens.
With certificates (PKI)
If user digital certificates are used for authentication, it requires the use of a Endpoint
Encryption Connector that imports the user certificates to the Endpoint Encryption
database from an external certificate repository; it then associates them with each
Endpoint Encryption user accordingly. Observe, as a side note, that the user group
containing the users must be a non-controlled group and with the password token
selected in order for the Connector to successfully set the user certificate as the token
to use. For more information about setting up Connectors and importing user digital
certificates, please consult the Endpoint Encryption Manager Administration Guide.
Vista de pagina 102
1 2 ... 98 99 100 101 102 103 104 105 106 107 108 ... 134 135

Comentarios a estos manuales

Sin comentarios