User's Manual

Using manual (drag and drop) registration ....................................... 19
Managing applications and credentials ............................................................. 19
Modifying application properties ....................................................... 19
Removing an application from Single Sign On ................................. 19
Exporting an application ................................................................... 19
Importing an application ................................................................... 20
Modifying credentials ........................................................................ 20
Using Application Protection .............................................................................................. 20
Restricting access to an application .................................................................. 21
Removing protection from an application .......................................................... 21
Changing restriction settings for a protected application .................................. 21
Advanced tasks (administrator only) .................................................................................................. 23
Specifying how users and administrators log on ............................................................... 23
Configuring custom authentication requirements .............................................................. 24
Configuring credential properties ....................................................................................... 24
Configuring Credential Manager settings .......................................................................... 25
Example 1—Using the “Advanced Settings” page to allow Windows logon
from Credential Manager .................................................................................. 25
Example 2—Using the “Advanced Settings” page to require user verification
before Single Sign On ....................................................................................... 26
3 Embedded Security for HP ProtectTools
Setup procedures ............................................................................................................................... 28
Enabling the embedded security chip ................................................................................ 28
Initializing the embedded security chip .............................................................................. 29
Setting up the basic user account ...................................................................................... 30
General tasks ..................................................................................................................................... 31
Using the Personal Secure Drive ....................................................................................... 31
Encrypting files and folders ................................................................................................ 31
Sending and receiving encrypted e-mail ............................................................................ 31
Changing the Basic User Key password ........................................................................... 32
Advanced tasks .................................................................................................................................. 33
Backing up and restoring ................................................................................................... 33
Creating a backup file ....................................................................................... 33
Restoring certification data from the backup file ............................................... 33
Changing the owner password .......................................................................................... 34
Resetting a user password ................................................................................................ 34
Enabling and disabling Embedded Security ...................................................................... 34
Permanently disabling Embedded Security ...................................................... 34
Enabling Embedded Security after permanent disable ..................................... 34
Migrating keys with the Migration Wizard .......................................................................... 35
4 Java Card Security for HP ProtectTools
General tasks ..................................................................................................................................... 37
Changing a Java Card PIN ................................................................................................ 37
Selecting the card reader ................................................................................................... 37
Advanced tasks (administrators only) ................................................................................................ 38
Assigning a Java Card PIN ................................................................................................ 38
Assigning a name to a Java Card ...................................................................................... 39
Setting power-on authentication ........................................................................................ 39
Enabling Java Card power-on authentication and creating an administrator
Java Card .......................................................................................................... 40
Creating a user Java Card ................................................................................ 41
iv ENWW