Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Defender 6.1 - Administration Guide

Getting started Managing Defender objects in Active Directory Configuring security tokens Securing VPN access Securing Web sites Securing Windows-based computers Defender Management Portal (Web interface) Securing PAM-enabled services Delegating Defender roles, tasks, and functions Automating administrative tasks Administrative templates Integration with Active Roles Appendices
Appendix A: Enabling diagnostic logging Appendix B: Troubleshooting common authentication issues Appendix C: Troubleshooting DIGIPASS token issues Appendix D: Defender classes and attributes in Active Directory Appendix E: Defender Event Log messages Appendix F: Defender Client SDK Appendix G: Defender Web Service API

Configuring Defender Soft Token

This section provides instructions on how to configure and assign to users the following security tokens:

  • Defender Soft Token for Android
  • Defender Soft Token for iOS
  • Defender Soft Token for Java
  • Defender Soft Token for Windows

To configure and assign Defender Soft Token to a user

  1. On the computer where the Defender Administration Console is installed, open the Active Directory Users and Computers tool (dsa.msc).
  2. In the left pane (console tree), expand the appropriate nodes to select the container where the user object is located.
  3. In the right pane, double-click the user object, and then click the Defender tab in the dialog box that opens.
  4. Below the Tokens list, click the Program button.
  5. In the Select Token Type step, click to select the Software token option. Click Next.
  6. In the Select Software Token step, click to select the Defender Soft Token you want to configure and assign.
  7. Complete the wizard to configure and assign the Defender Soft Token.

For more information about the wizard steps and options, see Defender Token Programming Wizard reference.

Configuring GrIDsure token

Before configuring and assigning the GrIDsure token, you need to enable the use of GrIDsure for authentication in the Defender Security Policy properties. Then, you need to assign that policy to the users you want to authenticate with the GrIDsure token. For more information, see Managing Defender Security Policies.

To configure the GrIDsure token for a user

  1. On the computer where the Defender Administration Console is installed, open the Active Directory Users and Computers tool (dsa.msc).
  2. In the left pane (console tree), expand the appropriate nodes to select the container where the user object is located.
  3. In the right pane, double-click the user object, and then click the Defender tab in the dialog box that opens.
  4. Below the Tokens list, click the Program button.
  5. In the Select Token Type step, click to select the Software token option. Click Next.
  6. In the Select Software Token step, click to select the GrIDsure token option.
  7. Complete the wizard to configure and assign the GrIDsure token.

    For more information about the wizard steps and options, see Defender Token Programming Wizard reference.

Enabling the use of Authy

You can allow users to authenticate via Defender by using one-time passwords generated with the Authy app. For more information about Authy, please visit http://www.authy.com.

To enable Authy for a user

  1. On the computer where the Defender Administration Console is installed, open the Active Directory Users and Computers tool (dsa.msc).
  2. In the left pane (console tree), expand the appropriate nodes to select the container where the user object is located.
  3. In the right pane, double-click the user object, and then click the Defender tab in the dialog box that opens.
  4. Below the Tokens list, click the Program button.
  5. In the Select Token Type step, click to select the Software token option. Click Next.
  6. In the Select Software Token step, click to select the Authy token option.
  7. Complete the wizard to enable Authy for the user.

    For more information about the wizard steps and options, see Defender Token Programming Wizard reference.

Enabling the use of Google Authenticator

You can allow users to authenticate via Defender by using one-time passwords generated with Google Authenticator.

To enable Google Authenticator for a user

  1. On the computer where the Defender Administration Console is installed, open the Active Directory Users and Computers tool (dsa.msc).
  2. In the left pane (console tree), expand the appropriate nodes to select the container where the user object is located.
  3. In the right pane, double-click the user object, and then click the Defender tab in the dialog box that opens.
  4. Below the Tokens list, click the Program button.
  5. In the Select Token Type step, click to select the Software token option. Click Next.
  6. In the Select Software Token step, click to select the Google Authenticator option.
  7. Complete the wizard to enable Google Authenticator for the user.

    For more information about the wizard steps and options, see Defender Token Programming Wizard reference.

Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation