9 - 22
Dolphin® 7900 Series Mobile Computer User’s Guide
User Tab
The User settings tab defines the protocol and the credentials used to authenticate a user.
Field
Description
Profile
Multiple user credential profiles can be created for use when the user roams from one network to another.
The drop-down list contains existing authentication credential profiles. Select a profile from the list to edit
it in the fields that follow.
Tapping Add permits new profiles to be added to the list. A
screen appears where you can enter a name for the new
profile.
Enter a Profile name and tap OK. The name entered appears
in the Profile drop-down list.
Tapping Delete deletes authentication profiles. To be deleted,
a profile cannot be assigned to a configured network.
Identity
This is the 802.1X identity supplied to the authenticator. The identity value can be up to 63 ASCII
characters and is case-sensitive.
For tunneled authentication protocols such as TTLS and PEAP, this identity (called the Phase 1 identity)
is sent outside the protection of the encrypted tunnel. Therefore, it is recommended that this field not
contain a true identity, but instead the identity “anonymous” and any desired realm (e.g.
[email protected]). For TTLS and PEAP, true user credentials (Phase 2 identity) are entered
in the Tunneled authentication section.
Note: When used with PEAP and the .NET Enterprise Server Version 5.2, this field must contain the
identity used in both Phase I and Phase II. The Phase II identity field is ignored.
Password
This is the password used for MD5-Challenge or LEAP authentication. It may contain up to 63 ASCII
characters and is case-sensitive. Asterisks appear instead of characters for enhanced security.
Authentication
type
This is the authentication method to be used - MD5-Challenge, LEAP, PEAP, TLS, or TTLS.
Your network administrator should let you know the protocols supported by the RADIUS server. The
RADIUS server sits on the network and acts as a central credential repository for Access Servers that
receive the radio signals and ultimately block or allow users to attach to the network.
Summary of Contents for Dolphin 7900 Series
Page 10: ...x Dolphin 7900 Series Mobile Computer User s Guide ...
Page 30: ...2 12 Dolphin 7900 Series Mobile Computer User s Guide ...
Page 62: ...5 6 Dolphin 7900 Series Mobile Computer User s Guide ...
Page 72: ...6 10 Dolphin 7900 Series Mobile Computer User s Guide ...
Page 262: ...17 4 Dolphin 7900 Series Mobile Computer User s Guide ...
Page 263: ......