Secure Computing Network Router SafeNet User Manual

Page of 80
5
Overview
5-2
Deploying Soft-PK to Your End Users 
Overview
You should deploy the Soft-PK installation program with a customized 
security policy and the necessary digital certificates. Custom 
installations are designed to make it easy to manage corporate 
security policies for tens, hundreds, or thousands of end users.
Along with the necessary software and files, you should provide 
specific Soft-PK installation and setup instructions for each end user. 
This facilitates management of corporate security policies for your end 
users and simplifies what the end user must do.
The Soft-PK product CD provided by Secure Computing includes a 
file (userworksheet.doc) in MS Word format that you can customize 
and send to users.
Figure 5-1. Sample
userworksheet.doc file
contained on Soft-PK
product CD
This worksheet contains five main sections that you should edit and 
save before distributing to end users. These sections are based on the 
information presented in earlier chapters in this manual.
Š
Dial-up network instructions
Š
Soft-PK installation instructions
Š
Certificate instructions
Š
Security policy instructions
Š
Basic connection instructions
Word 
format