Secure Access Configuration Guide For Wireless Clients Part Two: Wireless Data Privacy and Monitored Logon 2003-03

r. Click on the client (juser) to get Client details. Click the View User Rights
button to validate that the user is authenticated correctly.
Figure 4.20 – Client Details
© Copyright 2005 Hewlett-Packard Company, LP. 22