User Manual

Table Of Contents
AR 400 Reader User’s Manual 2003-2004 Matrics, Inc. 29
Define Trusted Hosts
To ensure the controlled and secured access to Reader Administrator Console functions, you should
designate which computers are authorized to have system access. You do this by setting uptrusted
hosts” (authorized computers.) Only computers that are registered in the system as trusted hosts can
successfully access Reader Administrator Console functions.
1. If you haven’t already done so, launch and log in to the Reader Administrator Console.
2. Click the Trusted Hosts link on the left-hand side of any page. The Trusted Hosts page displays.
Trusted hosts checking is disabled by default (to allow your first admin to log in from anywhere.)
With trusted hosts checking disabled, the IP address of any system that accesses the Reader is
automatically added to the Current Trusted Hosts List. You can use this feature to see which systems
have accessed the Reader, thereby enabling you to track down any unauthorized users.
However, if you wish to limit Reader access to only those computers that you’ve designated in the
Current Trusted Hosts List, then you should enable trusted hosts checking for higher security.