Specifications

Endpoint Encryption for Files and Folders client
70 |
User Web Recovery is used, then the questions entered by the user at the time of Web
Recovery registration will be presented.
Identification information such as department, cell phone number, nearest boss etc.
may be imported to the Endpoint Encryption database from external LDAP systems,
e.g. Microsoft ActiveDirectory. For more information about how to accomplish this,
please see the Endpoint Encryption Manager Administration Guide, chapters about
various connectors.
If the identification of the user is approved, then a response code will be presented to
the HelpDesk operator, or, in the User Web Recovery interface. This response code
should be entered into the client dialog appearing once the user has clicked Next>
after having presented the client challenge.
Figure32:EndpointEncryptionforFilesandFoldersRecoveryEnterrecoveryresponsecode
Once the response is entered into the dialog, select Enter. Based on the recovery key
size specified for the user in Endpoint Encryption Manager, additional response codes
may have to be entered. Please consult the Endpoint Encryption Manager
Administration Guide, chapter about User management for more information about
Recovery key sizes.
Once the response code(s) is entered, the user should click Next> in order to have
the response code verified. If successful, the user password will be reset to Endpoint
Encryption default ‘12345’. If the user has the password policy Force change if
‘12345’ enabled, then the user must change the password before proceeding with
the Endpoint Encryption for Files and Folders authentication. Please consult the
Endpoint Encryption Manager Administration Guide, chapter about password policies
for more information about password restrictions.