Sign-On vs. Stored Credentials
When using wireless security that requires a user name and password to be entered, the Summit Client Utility offers these
choices:
l
The Username and Password may be entered on the Credentials screen. If this method is selected, anyone using the
device can access the network.
l
The Username and Password are left blank on the Credentials screen. When the device attempts to connect to the
network, a sign on screen is displayed. The user must enter the Username and Password at that time to authenticate.
How to: Use Stored Credentials
1. After completing the other entries in the profile, click on the
Credentials
button.
2. Enter the Username and Password on the Credentials screen and click
the OK
button.
3. Click the
Commit
button.
4. For LEAP and WPA/LEAP, configuration is complete.
5. For PEAP-MSCHAP and PEAP-GTC, importing the CA certificate into the Windows certificate store is optional.
6. For EAP-TLS, import the CA certificate into the Windows certificate store. Also import the User Certificate into the
Windows certificate store.
7. Access the Credentials screen again. Make sure the
Validate server
and
Use MS store
checkboxes are checked.
8. The default is to use the entire certificate store for the CA certificate. Alternatively, use the
Browse
button next to the
CA Cert (CA Certificate Filename) on the Credentials screen to select an individual certificate.
9. For EAP-TLS, also enter the User Cert (User Certificate filename) on the credentials screen by using the
Browse
button.
10. If using EAP FAST and manual PAC provisioning, input the PAC filename and password..
11. Click the
OK
button then the
Commit
button.
12. If changes are made to the stored credentials, click
Commit
to save those changes before making any additional
changes to the profile or global parameters.
13. Verify the device is authenticated by reviewing the Status tab. When the device is property configured, the Status tab
indicates the device is Authenticated and the method used.
Note:
See
for more details.
Note:
If invalid credentials are entered into the stored credentials, the authentication will fail. No error message is displayed
and the user is not prompted to enter valid credentials.
8-19
Содержание MX7 Tecton
Страница 1: ...MX7 Tecton Hand Held Computer Microsoft Windows Embedded CE 6 Operating System Reference Guide ...
Страница 14: ...xiv ...
Страница 24: ...1 10 ...
Страница 38: ...3 4 ...
Страница 166: ...Hat Encoding Hat Encoded Characters Hex 00 through AD 4 128 ...
Страница 167: ...Hat Encoded Characters Hex AE through FF 4 129 ...
Страница 176: ...4 138 ...
Страница 177: ...4 139 ...
Страница 202: ...Enter user name password and domain to be used when logging into network resources 4 164 ...
Страница 209: ...4 171 ...
Страница 240: ...5 22 ...
Страница 276: ...7 30 ...
Страница 320: ...8 44 ...
Страница 325: ...Click the Request a certificate link Click on the advanced certificate request link 8 49 ...
Страница 326: ...Click on the Create and submit a request to this CA link 8 50 ...
Страница 334: ...8 58 ...
Страница 358: ...9 24 ...
Страница 362: ...10 4 ...
Страница 365: ...11 3 ...
Страница 366: ...Honeywell Scanning Mobility 9680 Old Bailes Road Fort Mill SC 29707 www honeywellaidc com E EQ MX7CERG Rev E 10 12 ...