background image

 

Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x 

Drawing#: 510-0100-003   Drawing Rev: 0.08   Rev Date: 04-25-2006 

Page 8 of 62

 

XyLoc Secure Login and Password Overview 

Windows 2000/XP 

The Windows NT based Operating Systems (2000/XP) are designed with more inherent 
security.  There is already a GINA in place which controls the logins, profiles and security 
permissions on the workstation.  The XyLoc system also has a GINA, which takes over the 
primary windows logon and in turn “calls” the Microsoft GINA.  Most of the inherent 
Microsoft security is still in place, and XyLoc enhances that security with a proximity based 
solution. 

The XyLoc Secure Login will be the first screen that is displayed on the PC, and the same 
basic login process will be used.  The exception is that hitting “CTRL+ALT+DEL” on the 
keyboard will allow access to the standard Microsoft/Novell login box and a user can login 
with a valid local or domain account and override XyLoc.  This is to allow an Administrator 
to still gain access to the PC, even if that Administrator does not have a XyLoc account.  
There is a registry setting that can be enabled which will block all non-XyLoc accounts from 
gaining access to the system, even Administrators, however this setting is disabled on the 
default installation. 

Also, the F8 keystroke at boot up is not disabled at login.  This is due to the security of 
Windows itself, and only an Administrator should have access to truly bypass XyLoc in Safe 
Mode. 

Lastly, in Windows 2000/XP, the password-protected screensaver is no longer password 
protected.  Because XyLoc takes control of the security of the workstation, XyLoc also 
handles the locking action of the PC.  Since the system will lock immediately when the user 
leaves his/her active range the password protection on the screensaver is no longer needed. It 
will still function as a standard screensaver, but will no longer have a password. 

XyLoc Password 

For flexibility and security, the XyLoc system provides an additional password, the 

XyLoc 

Password 

(sometimes referred to as a PIN).  The XyLoc password is only used in a Kiosk 

account and has two possible applications: 

1.

 

It is used by the 

Kiosk Account

 feature to provide multi-factor authentication in a shared 

log-on account.  

NOTE

:  Starting in version 8.2.4, this is the only password that is 

accepted in conjunction with a user’s XyLoc key. 

2.

 

It is used in conjunction with the user’s 

Personal Name

 when performing a 

Password 

Override

 in a Kiosk account to ensure individual security even when a XyLoc Key is not 

present. 

 

NOTE:  In a XyLoc Solo, when used in a unique account environment, the XyLoc Password 
(PIN) will synchronize with the user’s unique account password.  The Kiosk account is the 
only type that will have a XyLoc password that can differ from the user’s system account 
password.  If it is desired to use at PIN with a unique account, XyLoc 8.3.6 

with

 XSS 4.2.4 

must be used.  Earlier version of either will not support this functionality. 

Summary of Contents for XyLoc Client

Page 1: ...User s Guide XyLoc Client ver 8 x x ...

Page 2: ...istrative Levels 27 Administrator 27 User 28 Guest 28 AutoLogon 28 Authentication Methods 28 Login Authentication 28 Unlock Authentication 29 Configuring the XyLoc Software 30 Security Configuration and User Preferences 30 User Setup 31 User Name 31 Add User 32 What It Does 32 Delete User 32 Key ID 32 Add Key 32 Delete Key 32 Login Authentication 32 Allow Password Override No Key 33 Unlock Authent...

Page 3: ...c Keys 52 Find Specific Key Mode 53 Find Strongest Key Mode 53 Sequence number 53 Range 54 Key Voltage 54 Key Revision 54 Overriding the XyLoc System 55 User Forgets Their Key 55 User Does Not Have a XyLoc Key 56 Unlocking using Password Override 56 Replacing the XyLoc Battery 57 Software Removal 57 Troubleshooting 58 System Functionality 60 Normal Operational Mode 60 Hardware Architecture 60 Radi...

Page 4: ...wer any questions or provide any needed assistance Please contact Ensure Technologies Technical Support 734 547 1631 support ensuretech com FCC Compliance This device complies with Part 15 of the FCC Rules and with RSS 210 of Industry Canada Operation of this device is subject to the following two conditions 1 This device may not cause harmful interference and 2 This device must accept any interfe...

Page 5: ...ators or department managers One Lock can support multiple Keys for shared PC environments Kiosk accounts Access Methods Single factor security Hands Free Select User Name Dual factor security recommended Must Enter Password Transparent Operation Protects PC without requiring any action or intervention by the user Programmable Range User definable Active Zone for maximum flexibility Management Use...

Page 6: ...s of XyLoc Solo is three fold 1 Providing full time access control to PCs and portables 2 Taking the burden of compliance off the end user 3 Making the computer more convenient for the user XyLoc Solo runs on Windows 2000 and Windows XP It has been designed with careful consideration to the varying security dynamics of these operating systems XyLoc provides an additional layer of protection to the...

Page 7: ...eiver that plugs into a USB port XyLoc Key a small wireless transmitter with unique user ID that can be clipped to a belt or key ring worn on a neck lanyard or attached to an ID badge How XyLoc Works The XyLoc Lock and Key are in constant encoded two way wireless communication with each other As an authorized user approaches the PC the XyLoc Key identifies and authenticates the user and unlocks th...

Page 8: ...tself and only an Administrator should have access to truly bypass XyLoc in Safe Mode Lastly in Windows 2000 XP the password protected screensaver is no longer password protected Because XyLoc takes control of the security of the workstation XyLoc also handles the locking action of the PC Since the system will lock immediately when the user leaves his her active range the password protection on th...

Page 9: ...t performance from XyLoc For additional guidelines and suggestions please view the XyLoc Positioning Tutorial included on the installation CD Ideal placement is with the face of the Key parallel to the LED on the front of the Lock The best performance of the system will be achieved by trying to maintain this positioning while you are seated at your PC doing your work The primary factor in deciding...

Page 10: ...r will wear the Key on the right side of the belt use the Velcro strip to secure the Lock to the underside of the user s desk The Lock should be at the same height as the Key will be when the user is seated The user should keep the face of the Key pointing at the LED Ideal Lock Placement Acceptable Lock Placement Less Desirable Lock Placement ...

Page 11: ...Lock Status Light The LED indicator light on the XyLoc Lock has three possible states 1 Green The indicator light is green when the computer is unlocked and available for access 2 Red The indicator light is red when the computer is locked or disabled 3 Off The indicator light is off if the XyLoc system is not receiving power LED Status Light ...

Page 12: ...y ON just press and release the O button The KeyCard uses sophisticated power management technology and will automatically turn OFF approximately 9 hours after it was first turned ON You may extend this automatic turn OFF time up to 4 additional hours by pressing the O button one time for each additional hour any time after the Key has been turned ON The Status LED also functions as a battery test...

Page 13: ...ensure user compliance XyLoc is capable of identifying a Key that has been left stationary The XyLoc system can be configured to automatically secure the workstation should a Key be left unattended This action is also recorded in the Audit Logs NOTE To insert the battery into the KeyCard place the KeyCard with the XyLoc logo face down remove the two retaining screws and slide open the lid Replace ...

Page 14: ...e Windows XPe version of the XyLoc client only supports English The other language versions have been removed to keep the install package small enough to be installed on a Windows XPe Thin Client device NOTE In version 8 2 4 the installation program was changed to an MSI based installer This has changed some of the installation process slightly as well as the screens that are displayed The instruc...

Page 15: ...Ensure Technologies User s Guide for XyLoc Client ver 8 x x Drawing 510 0100 003 Drawing Rev 0 08 Rev Date 04 25 2006 Page 15 of 62 5 Click Next on the welcome screen to continue with installation ...

Page 16: ...4 25 2006 Page 16 of 62 6 Please review the terms of the Software License Agreement If you accept all of the terms of the Software License Agreement click Yes and the installation will continue If you do not accept all of the terms of the Software License Agreement click No to cancel the installation process ...

Page 17: ...5 2006 Page 17 of 62 7 Once the program is ready to install the files the Ready to Install window will display Click Install on this screen when you are ready to install NOTE This screen does not come up in 8 2 3 and earlier 8 For NT4 users the Question window will be presented Select Yes when using the USB lock ...

Page 18: ...n account type the account name here being careful to enter the name exactly as it appears for your normal logon Please create a user via the Users control panel in Windows 10 Lock Identification XyLoc will attempt to find the port to which the Lock is attached Click OK to continue On a new installation the Lock should not be connected yet therefore XyLoc will not find the Lock The Port Selection ...

Page 19: ...03 Drawing Rev 0 08 Rev Date 04 25 2006 Page 19 of 62 11 If you are using the USB version connect the lock to the computer at this time NOTE On Windows XP the Found New Hardware Wizard will appear Leave the default for Install the software automatically Recommended and click Next ...

Page 20: ...drivers and install automatically 13 If for some reason Windows XP does not find the driver it will likely prompt the user to Insert the disk labeled XyLocUSB Installation Diskette If this occurs click OK and then click Browse Point to C WINDOWS System32 Drivers directory which should contain the XyLocUSB sys file necessary to install the USB device Click OK ...

Page 21: ...Ensure Technologies User s Guide for XyLoc Client ver 8 x x Drawing 510 0100 003 Drawing Rev 0 08 Rev Date 04 25 2006 Page 21 of 62 14 Click Finish to complete the new device installation ...

Page 22: ... Once Windows has finished installing the device click Continue 16 Confirm XyLoc Key ID XyLoc will attempt to identify the closest Key and insert that Key ID into this field Refer to the label on your XyLoc Key and verify that it matches the Key ID shown If no Key ID is shown or if it is not the correct Key ID please enter it manually ...

Page 23: ...OTE This field is an optional field If the name is left blank the actual Account Name will be used instead 18 XSS IP Configuration This screen has a field to enter the address of the XSS XyLoc Security Server if there is one If there is no XSS this field can be left blank NOTE XyLoc 8 2 4 also added the ability to use the server s DNS name for the address instead of the IP address You can enter ei...

Page 24: ...yLoc Client ver 8 x x Drawing 510 0100 003 Drawing Rev 0 08 Rev Date 04 25 2006 Page 24 of 62 19 XyLoc Configuration Summary This screen provides a summary of the features you just selected Choose Finish to complete the Installation Wizard ...

Page 25: ...with the XyLoc key 23 Your network provider logon screen Microsoft or Novell will then appear Enter your system account password Unless your system account password periodically expires this will be the last time you will be asked to enter your Microsoft or Novell password from the network provider logon screen 24 Once the desktop appears you will also see a XyLoc Status message that will appear b...

Page 26: ...ping away from your PC and watch to see if it secures If it does you re all set and ready to go You can also adjust the range at which the XyLoc locks and unlocks your PC see Setting the Active Zone in the section for Advanced User Settings 27 To further customize your installation follow the directions under Configuring the XyLoc Software NOTE The XyLoc icon in the System Tray can be used to view...

Page 27: ...ager see Getting Started User Setup Only an Administrator can access the Administrative Levels settings User Setup PC Setup Administrator Full access to Configuration Manager and all Users settings User Only Range Settings and Personal Name can be changed No changes can be made Guest No access to XyLoc Configuration Manager A User can only access his her own settings no one else s settings will be...

Page 28: ...the logon process for the user The first time a user successfully logs in to XyLoc using any of the methods described below they will be prompted to enter their network logon and password The next time the user logs in XyLoc will automatically log the user in to their network account Authentication Methods There are two types of authentication settings available in the User Setup tab of the XyLoc ...

Page 29: ...r name from the list of users found Must Enter Password This setting requires that a user enter his her password before that user can unlock The system will display all the authorized keys in the area and once the user selects their name from the list they will be prompted for their password At Unlock the user must select their name from the list regardless of how many keys are found Unlike at Log...

Page 30: ...ouble click on the ET XyLoc icon in the System Tray The XyLoc Configuration Manager has two tabs from which XyLoc s operating parameters are set User Setup PC Setup NOTE The XyLoc system is NOT disabled when the XyLoc Configuration Manager is running If the system locks while the configuration manager is open any unsaved changes will be lost NOTE Starting with XyLoc version 8 3 5 if an XSS address...

Page 31: ...selected account Click Add Key to use the Key Wizard to add a new key Click Delete Key to delete the selected key Click Advanced Settings to access additional settings Select Login Authentication method Select Unlock Authentication method for the Select Allow Password Override No Key to allow override access at the initial login Select Allow Password Override No Key to enable override access to th...

Page 32: ...be removed Also see Disable this Account Key ID What It Does Recommended Use Shows the unique number of the Key or Keys issued to a particular login account See Adding New Keys and Kiosk Accounts Add Key What It Does Recommended Use Enables you to add a new key for the selected user or kiosk account See Adding New Keys and Kiosk Accounts Delete Key What It Does Recommended Use Enables you to delet...

Page 33: ... security Allow Password Override No Key What It Does Recommended Use Allows the user to login to the PC without requiring an authorized key Administrators should enable this setting if they want to allow user access without the XyLoc Key e g when the user forgets his Key If this option is unchecked the account cannot be accessed without a key This provides maximum security especially when used in...

Page 34: ...ettings for maximum security Allow Password Override No Key What It Does Recommended Use Allows the user to unlock the PC without requiring an authorized key Administrators should enable this setting if they want to allow the user to unlock without the XyLoc Key e g when the user forgets his Key If this option is unchecked the account cannot be unlocked without a key This provides maximum security...

Page 35: ...or XyLoc operation based on user preference and office size environment Range Refinement What It Does Recommended Use Permits fine adjustment of the Active Zone by opening the Range Setting box Select when minor adjustments of the Active Zone are desired Personal Name What It Does Recommended Use Specifies the user s full name Enter the user s full name if you prefer additional user information be...

Page 36: ...ive Level for the selected user and key Select to play the Default system sound when XyLoc secures the PC Select to enable the Pass Key option for Administrators Select Disable Key to disable specific key from log on account Select the Auto Logoff Time to close an account after a period of inactivity after screen is locked Select to assist with preventing users from leaving key unattended Allows t...

Page 37: ...d of logging off users Auto Logoff allows you to prevent a locked PC from staying logged on indefinitely This feature can work independently or in conjunction with the User can logoff locked workstation function User can logoff locked workstation What It Does Recommended Use Allows the user to log off another user who logged on to and locked a workstation For fastest multi user access also see Kio...

Page 38: ...ocking What It Does Recommended Use Plays the Default system sound when XyLoc secures the PC Enable this setting initially to provide users with audio feedback when their PCs are secured After users are familiar with XyLoc s operation they may no longer need or desire this feature Lock if the Key is Stationary for What It Does Recommended Use Secures the computer s desktop automatically if the use...

Page 39: ...ended Use Locks the PC after a period of inactivity in password override mode Enable this for when the users key has been forgotten and you wish the PC to lock after a period of inactivity This is NOT the recommended use of XyLoc as it does not take advantage of XyLoc s full time proximity based security capabilities Run Application Integration Logoff What It Does Recommended Use Executes a logoff...

Page 40: ...tive Zone by selecting the appropriate Range for your environment You can further refine this range with Range Refinement The top bar labeled Active Zone shows the approximate range where the computer will remain unlocked Below this is an adjustable range scale This permits the setting of Initial Unlock and the Lock The Initial Unlock setting shown in Green sets the ...

Page 41: ...where the computer will secure as the user steps away NOTE Given the nature of RF communications and the differing environmental characteristics of each user s office or cubicle environment the precise Active Zone setting will vary for each user s environment Ensure recommends that users initially selecting Short and then decide if Medium or Long is a more appropriate setting Further adjustments c...

Page 42: ... machine will appear in the User Name window of the Configuration Manager for an administrator to create XyLoc accounts from You can also add existing network accounts to XyLoc by using the XyLoc Configuration Manager s Add User button NOTE This will only add existing Microsoft or Novell network accounts to XyLoc This does not actually create a new network account The Network Administrator on the ...

Page 43: ...Rev 0 08 Rev Date 04 25 2006 Page 43 of 62 2 To create a new network user enter a valid user name in the field and then click Next to proceed 3 Select the Administrative Level for the new user Click Next to proceed 4 Enter the identification number for the XyLoc Key assigned to the new user ...

Page 44: ...ver 8 x x Drawing 510 0100 003 Drawing Rev 0 08 Rev Date 04 25 2006 Page 44 of 62 5 Select the Range setting for this Key 6 Select the Authentication Methods for this Key 7 Finally enter a personal name to be used to more identify the owner of this Key ...

Page 45: ... Sixth Grade Math account in a school You may easily set up such a kiosk account by adding multiple keys to the same account In this Kiosk account all users share the same XyLoc preferences except for Range and XyLoc Password This enables the shared use of a single account while still tracking individual users access of the account in the XyLoc activity logs Switching among users is fast and conve...

Page 46: ...d on the label on the back of the Key and click Next to proceed 2 Select the Range for the new Key and click Next to continue 3 Enter and confirm a unique Password for the new Key and click Next to continue NOTE This password is the XyLoc Password or XyLoc PIN that has been referenced in this document already Starting in version 8 2 4 this password is the only password that is accepted when used i...

Page 47: ...epping away from the PC It is also possible to have a button available on the desktop to manually lock the desktop without having to right click the icon By default this button is disabled To activate this feature right click on the XyLoc icon and on the popup menu click on Show Lock PC Button This will put a lock button right above the system tray on the desktop The user can click this button at ...

Page 48: ...installation to be centrally managed through a XyLoc Security Server XSS Not used with XyLoc Solo installations but offers easy expansion and management of larger XyLoc installations Please refer to XSS User Guide for additional details Select the port to which XyLoc is attached Click Advanced Settings to access additional settings such as Logging Level Click Save to keep any settings changes you ...

Page 49: ...at It Does Recommended Use Specifies the number of log records to upload to the XSS at a time Provides an Administrator the ability to manage traffic on the network between the XyLoc client and the XSS Advanced Settings What It Does Recommended Use Opens the Advanced PC Settings window Click the Advanced Settings button to modify XSS and Password settings ...

Page 50: ...ls XyLoc Mode What It Does Recommended Use Provides two modes of operation normal use Security or third party software development SDK NOTE This must be set to Security in order for the XyLoc to lock the PC Min Password Length What It Does Recommended Use Determines the minimum acceptable password length for the XyLoc Password This should be set to at least 4 to provide robust security Settings fo...

Page 51: ...t data to track User Activity This encrypted log may be accessed under the Tools menu of the XyLoc Configuration Manager User Activity Log What It Does Recommended Use Displays a history of each user that has logged on and logged off of the machine Track user activity including dates and times NOTE This option will only be available to a XyLoc Administrator ...

Page 52: ...c Client ver 8 x x Drawing 510 0100 003 Drawing Rev 0 08 Rev Date 04 25 2006 Page 52 of 62 Testing XyLoc Keys Selecting Display Key Info from the Tools menu provides administrators with a diagnostic tool for identifying and testing XyLoc Keys ...

Page 53: ...strator can view other keys and therefore change this setting from the active key Find Strongest Key Mode What It Does Recommended Use Allows you to test the XyLoc Key with the strongest signal within 50 feet of the XyLoc Lock Select Find Strongest Key mode and click Start Search to identify the XyLoc Key with the strongest signal you can also use this function to determine or verify a Key ID by p...

Page 54: ...p determine the optimal Range for your environment Key Voltage What It Does Recommended Use Displays the current voltage of keys that support this function While the system is searching for the key press the O button on the key and the voltage will be displayed Key Revision What It Does Recommended Use Displays the current revision of the key Use to determine the revision of the key when instructe...

Page 55: ...e key is not present The XyLoc system software ensures that there is always at least one administrator that can password override into a machine NOTE Make sure that your XyLoc installation is working with the Allow Password Override No Key checked before un checking the option You will not be able to gain access to your computer if the Key is missing or not functioning properly or if you forget yo...

Page 56: ...r PC Administrators or Helpdesk staff mostly use this to allow them access to a PC when they don t have a XyLoc key There is a registry setting available to disable any non XyLoc user from gaining access to a XyLoc protected PC however this is not recommended unless the centralized server XSS is available as this does restrict ALL non XyLoc users including Administrator Contact Ensure Technologies...

Page 57: ...ity indicators side up 6 Slide compartment cover to close and replace the screws Software Removal In the event that you have to remove the XyLoc client software please use the following instructions 1 Before you can remove the software you must stop the XyLoc service This can be done through the Services applet in the Control Panel in Windows or through the XyLoc Configuration Manager under Tools ...

Page 58: ...onment reference Microsoft TechNet article Q294739 Ensure Technologies supports Windows XP in a network environment The XyLoc Kiosk account provides this type of functionality Please contact Ensure Technologies for further information 6 The XyLoc icon in the System Tray can be used to view the status of your system and to help troubleshoot the system Simply move your cursor over the XyLoc icon to ...

Page 59: ...v Date 04 25 2006 Page 59 of 62 11 Windows XP Embedded Thin Clients The XPe version of the XyLoc client does not support languages other than English at this time Earlier versions did erroneously allow the user to select other languages However English is the only option that will install successfully ...

Page 60: ...ew features can be added The Lock can receive firmware updates via the USB port This firmware is stored in flash memory and is used to control the operation of the system The communications controller controls the Lock to host communications and is permanently programmed The Lock also incorporates an EEPROM that stores operational parameters such as channel allocations The Key has a similar archit...

Page 61: ...e same frequencies at exactly the same time Time Division Multiple Access TDMA Keys that are within range of each other can also reuse the same channel allocation by the use of time division multiple access This allows several hundred Keys to coexist within a 50 foot radius As the Keys move through the building they adaptively find new time slots to avoid interference with other Keys in that area ...

Page 62: ...ved support for Windows ME RS 0 03 01 26 2005 Updated RS 0 04 02 21 2005 Added removal instructions RS 0 05 05 09 2005 Removed XyCrypt RS 0 06 07 18 2005 Added changes to installer and Kiosk account that were done in XyLoc version 8 2 4 RS 0 07 04 25 2006 Added support for PINs in a Unique account and added more detail on XPe support RS 0 08 XX XX 2008 Update drawings contact information removed W...

Reviews: