
Sign-On vs. Stored Credentials
When using wireless security that requires a user name and password to be entered, the Summit Client Utility offers these
choices:
l
The Username and Password may be entered on the Credentials screen. If this method is selected, anyone using the
device can access the network.
l
The Username and Password are left blank on the Credentials screen. When the device attempts to connect to the
network, a sign on screen is displayed. The user must enter the Username and Password at that time to authenticate.
How to: Use Stored Credentials
1. After completing the other entries in the profile, click on the
Credentials
button.
2. Enter the Username and Password on the Credentials screen and click the
OK
button.
3. Click the
Commit
button.
4. For LEAP and WPA/LEAP, configuration is complete.
5. For PEAP-MSCHAP and PEAP-GTC, importing the CA certificate into the Windows certificate store is optional.
6. For EAP-TLS, import the CA certificate into the Windows certificate store. Also import the User Certificate into the
Windows certificate store.
7. Access the Credentials screen again. Make sure the
Validate server
and
Use MS store
checkboxes are checked.
8. The default is to use the entire certificate store for the CA certificate. Alternatively, use the
Browse
button next to the
CA Cert (CA Certificate Filename) on the Credentials screen to select an individual certificate.
9. For EAP-TLS, also enter the User Cert (User Certificate filename) on the credentials screen by using the
Browse
button.
10. If using EAP FAST and manual PAC provisioning, input the PAC filename and password..
11. Click the
OK
button then the
Commit
button.
12. If changes are made to the stored credentials, click
Commit
to save those changes before making any additional
changes to the profile or global parameters.
13. Verify the device is authenticated by reviewing the Status tab. When the device is property configured, the Status tab
indicates the device is Authenticated and the method used.
Note:
See
for more details.
Note:
If invalid credentials are entered into the stored credentials, the authentication will fail. No error
message is displayed. The user may or may not be prompted to enter valid credentials.
How to: Use Sign On Screen
1. After completing the other entries in the profile, click on the
Credentials
button. Leave the Username and Password
blank. No entries are necessary on the Credentials screen for LEAP or LEAP/WPA.
2. For PEAP-MSCHAP and PEAP-GTC, importing the CA certificate into the Windows certificate store is optional.
3. For EAP-TLS, import the CA certificate into the Windows certificate store. Also import the User Certificate into the
Windows certificate store.
4. Access the Credentials screen again. Make sure the
Validate server
and
Use MS store
checkboxes are checked.
5. The default is to use the entire certificate store for the CA certificate. Alternatively, use the Browse button next to the
CA Cert (CA Certificate Filename) on the Credentials screen to select an individual certificate.
6-19
Summary of Contents for THOR VM1
Page 17: ...Components Front View 1 Power Button 2 Speakers 3 Ambient Light Sensor 4 Microphone 1 3 ...
Page 43: ...IBM 3270 Overlay 2 25 ...
Page 162: ...Hat Encoding 3 100 ...
Page 163: ...3 101 ...
Page 175: ...About This tab displays information on the Gobi 2000 radio installed in the Thor VM1 3 113 ...
Page 179: ...3 117 ...
Page 199: ...Enter user name password and domain to be used when logging into network resources 3 137 ...
Page 206: ...3 144 ...
Page 220: ...3 158 ...
Page 228: ...4 8 ...
Page 301: ...Click the Request a certificate link Click on the advanced certificate request link 6 45 ...
Page 302: ...Click on the Create and submit a request to this CA link 6 46 ...
Page 312: ...7 4 ...
Page 318: ... Shift 9 Shift 0 8 6 ...