Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006
Page 2 of 62
Table of Contents
Introduction .................................................................................................................................... 4
Your XyLoc Package ............................................................................................................................... 4
Support Information ................................................................................................................................. 4
XyLoc Core Functionality ........................................................................................................................ 5
XyLoc Solo Overview .................................................................................................................... 6
The XyLoc System ................................................................................................................................... 6
XyLoc Product Architecture .................................................................................................................... 7
How XyLoc Works ........................................................................................................................................... 7
XyLoc Secure Login and Password Overview ......................................................................................... 8
Windows 2000/XP ............................................................................................................................................ 8
XyLoc Password ............................................................................................................................................... 8
Getting Started ............................................................................................................................... 9
Using the XyLoc Lock ............................................................................................................................. 9
Installing the XyLoc Lock (USB) ............................................................................................................ 9
Placement of the XyLoc Lock ........................................................................................................................... 9
The XyLoc Lock Status Light ......................................................................................................................... 11
Using the XyLoc Key ............................................................................................................................. 12
Installing the XyLoc Software ............................................................................................................... 14
Understanding Core Settings .................................................................................................................. 27
Administrative Levels ..................................................................................................................................... 27
Administrator .......................................................................................................................................... 27
User ......................................................................................................................................................... 28
Guest ....................................................................................................................................................... 28
AutoLogon ...................................................................................................................................................... 28
Authentication Methods .................................................................................................................................. 28
Login Authentication ............................................................................................................................... 28
Unlock Authentication ............................................................................................................................ 29
Configuring the XyLoc Software ........................................................................................................... 30
Security Configuration and User Preferences .................................................................................................. 30
User Setup ....................................................................................................................................................... 31
User Name ............................................................................................................................................... 31
Add User… ............................................................................................................................................. 32
What It Does: ......................................................................................................................................... 32
Delete User… .......................................................................................................................................... 32
Key ID ..................................................................................................................................................... 32
Add Key… .............................................................................................................................................. 32
Delete Key… ........................................................................................................................................... 32
Login Authentication ............................................................................................................................... 32
Allow Password Override (No Key) ....................................................................................................... 33
Unlock Authentication ............................................................................................................................ 34
Allow Password Override (No Key) ....................................................................................................... 34
Unlock to Key Only for up to
x
seconds/minutes .................................................................................... 34
Range ...................................................................................................................................................... 35
Range Refinement ................................................................................................................................... 35
Personal Name ........................................................................................................................................ 35
Advanced Settings ................................................................................................................................... 35
Advanced User Settings .................................................................................................................................. 36
Administrative Level ............................................................................................................................... 36
Auto Logoff Time ................................................................................................................................... 37
User can logoff locked workstation ......................................................................................................... 37
Key ID ..................................................................................................................................................... 37
Pass Key .................................................................................................................................................. 38
Beep When Locking ................................................................................................................................ 38
Lock if the Key is Stationary for ............................................................................................................. 38
Note: Ensure recommends the 1-minute option for demonstration purposes only. ............................... 38
Содержание XyLoc Client
Страница 1: ...User s Guide XyLoc Client ver 8 x x ...