Thor VM2 with with Microsoft Windows Embedded CE 6.0 User Guide
315
Sign-On vs. Stored Credentials
When using wireless security that requires a user name and password to be entered, the
Summit Client Utility offers these choices:
•
The Username and Password may be entered on the Credentials screen. If this
method is selected, anyone using the device can access the network.
•
The Username and Password are left blank on the Credentials screen. When the
device attempts to connect to the network, a sign on screen is displayed. The user
must enter the Username and Password at that time to authenticate.
To Use Stored Credentials
1. After completing the other entries in the profile, click on the Credentials button.
2. Enter the Username and Password on the Credentials screen and click the OK
button.
3. Click the Commit button.
4. For LEAP and WPA/LEAP, configuration is complete.
5. For PEAP-MSCHAP and PEAP-GTC, importing the CA certificate into the Windows
certificate store is optional.
6. For EAP-TLS, import the CA certificate into the Windows certificate store. Also
import the User Certificate into the Windows certificate store.
7. Access the Credentials screen again. Make sure the Validate server and Use MS
store checkboxes are checked.
8. The default is to use the entire certificate store for the CA certificate. Alternatively,
use the Browse button next to the CA Cert (CA Certificate Filename) on the
Credentials screen to select an individual certificate.
9. For EAP-TLS, also enter the User Cert (User Certificate filename) on the credentials
screen by using the Browse button.
10. If using EAP FAST and manual PAC provisioning, input the PAC filename and
password.
11. Click the OK button then the Commit button.
12. If changes are made to the stored credentials, click Commit to save those changes
before making any additional changes to the profile or global parameters.
13. Verify the device is authenticated by reviewing the Status tab. When the device is
property configured, the Status tab indicates the device is Authenticated and the
method used.
Note:
See
for more details.
Note:
If invalid credentials are entered into the stored credentials, the authentication will fail. No
error message is displayed. The user may or may not be prompted to enter valid
credentials.
Содержание Thor VM2
Страница 1: ...User Guide Thor VM2 Vehicle Mounted Computer with Microsoft Windows Embedded CE 6 0 ...
Страница 16: ...4 Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide ...
Страница 63: ...Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide 51 ...
Страница 64: ...52 Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide ...
Страница 288: ...276 Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide ...
Страница 310: ...298 Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide ...
Страница 352: ...340 Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide ...
Страница 385: ...Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide 373 Hat Encoding ...
Страница 398: ... Honeywell 9680 Old Bailes Road Fort Mill SC 29707 www honeywellaidc com VM2 CE UG Rev D 9 17 ...