Sony FIU-710 Manual

Page of 118
 
 
Table of Contents 
 
 
 
Chapter 1: Welcome to SecureSuite............................................... 8
 
A
BOUT THE 
G
UIDE
.......................................................................................................................... 8
 
N
AMING 
C
ONVENTIONS AND 
T
YPEFACES
.................................................................................... 10
 
S
YSTEM 
R
EQUIREMENTS
............................................................................................................... 11
 
A
DDITIONAL 
I
NFORMATION
.......................................................................................................... 11
 
Chapter 2: SecureSuite Overview................................................. 12
 
S
ECURE
S
UITE 
H
IGHLIGHTS
........................................................................................................... 12
 
A
RCHITECTURE
............................................................................................................................. 15
 
SecureSuite XS Workstation vs. SecureSuite XS Server ............................................... 15 
SecureSuite User Roles................................................................................................. 15 
Chapter 3: Installing SecureSuite XS Workstation...................... 16
 
I
NSTALLATION
.............................................................................................................................. 16
 
I
NITIAL 
L
OGON 
P
ROCEDURE
......................................................................................................... 18
 
T
HE 
S
ECURE
S
UITE 
W
ELCOME 
S
CREEN
......................................................................................... 19
 
Chapter 4: SecureSuite Key Features .......................................... 20
 
S
YSTEM 
I
NTEGRITY 
V
ERIFICATION
.............................................................................................. 20
 
RAS S
UPPORT
............................................................................................................................... 20
 
P
OLICY 
M
ANAGEMENT
................................................................................................................. 20
 
C
REDENTIAL 
C
ACHING
................................................................................................................. 21
 
R
ANDOMIZE 
P
ASSWORD
............................................................................................................... 21
 
L
OGON TIME
.................................................................................................................................. 21
 
W
INDOWS 
S
YSTEM 
T
RAY
............................................................................................................. 22
 
SecureSession for Applications Icon ............................................................................ 22 
Authentication Method Icons........................................................................................ 22 
Chapter 5: Using SecureSuite ....................................................... 23
 
S
ECURE
S
UITE 
L
ICENSE 
M
ANAGER
............................................................................................... 23
 
The License Manager Properties Dialog ..................................................................... 23 
Product License Keys ................................................................................................... 24 
User License Keys ........................................................................................................ 25 
Duplicate License Keys ................................................................................................ 26 
S
ECURE
S
UITE 
U
SER 
A
UTHENTICATION
........................................................................................ 27
 
Authentication Methods................................................................................................ 27 
Verification vs. Identification ....................................................................................... 28 
Multiple Authentication Methods ................................................................................. 28 
The Authentication Dialog ........................................................................................... 29 
S
ECURE
S
UITE 
I
CONS AND THE 
W
ELCOME 
S
CREEN
...................................................................... 31
 
SecureSuite Icons.......................................................................................................... 31 
The SecureSuite Welcome Screen................................................................................. 32 
U
SING THE 
S
ECURE
S
UITE 
H
ELP 
S
YSTEM
...................................................................................... 33
 
O
NE
-T
OUCH 
L
OGON
..................................................................................................................... 33
 
W
ORKSTATION 
S
ECURITY
............................................................................................................. 34