Fortitoken Cloud Admin Guide

Total Page:16

File Type:pdf, Size:1020Kb

Fortitoken Cloud Admin Guide FortiToken Cloud - Admin Guide Version 21.2.d FORTINET DOCUMENT LIBRARY https://docs.fortinet.com FORTINET VIDEO GUIDE https://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTINET TRAINING & CERTIFICATION PROGRAM https://www.fortinet.com/support-and-training/training.html NSE INSTITUTE https://training.fortinet.com FORTIGUARD CENTER https://www.fortiguard.com END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: [email protected] JJune 28, 2021 FortiToken Cloud 21.2.d Admin Guide TABLE OF CONTENTS Introduction 7 Main features 7 Licensing 8 Compatible Fortinet applications 9 Supported browsers 9 Important notes 9 Transferring auth clients 10 Use of non-officially supported FOS 10 The same token for the same user on multiple auth clients 10 FOS 6.2.3 and 6.4.0 CLI differences 10 Admin accounts and realms 11 Supported hard tokens 11 No SMS MFA with FAC as LDAP server 11 A single FTC user in multiple auth clients 11 FAC users' name issues on FTC GUI 12 How to use FortiClient 12 Product documentation and support 12 Release history 14 21.2.d 14 21.2.c 14 21.2.a 14 21.1.a 14 20.4.d 15 20.4.c 15 20.4.a 15 20.3.e 15 20.3.d 15 20.2.c 16 20.1.b 16 20.1.a 16 4.4.c 16 4.4.b 17 4.3.a 17 4.2.d 17 4.2.c 17 4.2.b 17 Getting started—FGT-FTC users 18 Register your FTC subscription 18 Upgrade FortiOS 19 Log in to the FortiToken Cloud portal 19 Activate FGT VDOMs for FTC service 20 Add an admin user for FTC service 20 FortiToken Cloud 21.2.d Admin Guide 3 Fortinet Technologies, Inc. Add a local user for FTC service 20 Add remote FortiGate users for FTC service 21 Getting started—FAC-FTC users 22 Register your FTC subscription 22 Upgrade FortiAuthenticator OS 23 Log in to the FortiToken Cloud portal 23 Activate FAC for FTC service 24 Add an admin user for FTC service 24 Add a local user for FTC service 24 FOS CLI commands for FortiToken Cloud 26 Global system configuration 26 Access FTC management commands 26 Configure admin users 27 Configure local users 28 Configure local LDAP users for FTC service 29 Configure wildcard LDAP users for FTC service 29 Configure local RADIUS users for FTC service 30 Diagnose FortiToken Cloud 30 FortiToken Cloud GUI 32 Launch FortiToken Cloud 33 Log in as a regular FTC user 34 Log in as an IAM user 34 FortiCloud 34 The FortiCloud Logo 35 Your FortiCloud account 35 Services 35 Support 37 Dashboard 37 Last 10 authentication attempts in 30 days 38 Administrators 39 Create a sub-admin group 40 Delete a sub-admin group 41 Realms 41 Create a custom realm 42 Edit a realm 43 View realm permission 43 Delete a realm 43 View realm settings 44 Users 44 Get a new FTM token 46 Auto-assign FTKs to selected users 46 Add user aliases 46 Hide/Show full FortiAuthenticator username 47 View a user's auth clients 47 Edit a user 47 FortiToken Cloud 21.2.d Admin Guide 4 Fortinet Technologies, Inc. FortiProducts 48 Assign an auth client to a realm 49 Edit an auth client 49 Viewing additional information about an auth client 49 Delete an auth client 49 Web Apps 50 Add an auth client 50 Regenerate the API credentials 51 Edit a web app 51 Delete a web app 51 Devices (HA) 52 Search for a standalone device 52 Add devices to cluster 52 Remove devices from a cluster 53 Move a device between clusters 53 Mobile Tokens 53 Hardware Tokens 54 Add hard tokens manually 55 Batch-upload hard tokens 55 Assign a hard token to a user 56 Delete hard tokens 56 Usage 57 View usage data 57 View current user count and user quota 58 Credits 58 Flexible credit-based usage model 58 SKUs and user limits 59 Number of users vs. number of auth client and realms supported 59 Replenish your credit balance 60 Licenses 61 Settings 61 Global 61 Realm 63 Templates 69 Logs 71 Authentication logs 71 Management logs 73 FortiToken Mobile 76 Supported FTM apps 76 Activate FTM tokens 77 Activate third-party tokens 77 Use FTM tokens 77 FAQs 78 Does FortiGate support FTC AD-wildcad 2FA if cnid=sAMAcountName? 78 How to configure FortiGate for LDAP authentication? 78 Step 1: Configure LDAP server in FortiGate via CLI 78 Step 2: Add LDAP server as 'remote server' to the existing SSL VPN group 78 FortiToken Cloud 21.2.d Admin Guide 5 Fortinet Technologies, Inc. Step 3: Search and query users from the AD-LDAP server 79 Step 4: Verify all LDAP users on FTC portal 79 How do FTC credits work? 79 Can you give an example of FTC flexible licensing options? 79 How to check the auth status for WebApp API client for push authentication? 79 Single auth status checking by auth id 79 Batch auth query 80 What are the required parameters for post auth by WebApp client? 80 How to Configure SNMP server on FortiOS 80 Step 1: Configure the SMTP server 80 Step 2: Configure SMS service on FortiGate 80 Step 3: Configure SMS service on SMS provider 80 Step 4: Create a user(s) with SMS with two-factor authentication 81 How does FortiOS support FortiToken Cloud? 81 How to prevent LDAP users from bypassing 2FA? 93 How to debug ‘user is unable to issue a new FortiToken Cloud token’? 93 How to transfer ForitiToken Cloud auth clients from one account to another? 94 How to register FortiToken Cloud license to start using FortiToken Cloud service? 94 What is realm? And what does it do? 94 What does the status of the FortiToken Cloud (FTC) token mean? 94 Can FTC admin enable or disable push feature from the FortiToken Cloud portal? 95 How to add a second FortiGate to the realm where I already have one FortiGate up running? 95 How to create an aliased user? 95 How to provision FortiToken Cloud? 96 Change log 97 FortiToken Cloud 21.2.d Admin Guide 6 Fortinet Technologies, Inc. Introduction Introduction Thank you for choosing FortiToken Cloud (FTC)! FTC is an Identity and Access Management as a Service (IDaaS) cloud service offering by Fortinet. It enables FortiGate (FGT) and FortiAuthenticator (FAC) customers to add multi-factor authentication (MFA) for their respective users, with no additional hardware or software required. It protects local and remote FGT and FAC administrators as well as firewall and VPN users. Main features FortiToken Cloud (FTC) offers the following main features: l Multi-factor authentication (MFA) for FGT and FAC devices—FTC provides a cloud-based MFA solution for all your FortiGate (FGT) and FortiAuthenticator (FAC) devices. l Integration with FOS 6.2—FTC works seamlessly with FortiOS (FOS) 6.2.x. l Support for MFA bypass and new token request—FTC admin users can allow end-uses to bypass MFA and request new tokens on behalf of their end-users easily from the GUI. l Automatic lockout of users for excessive MFA failures—FTC automatically locks out users when they have breached their specified MFA failure threshold, ensuring security and integrity of your account. l Secure, cross-platform token transfer—You can securely transfer your FTC and third-party tokens between iOS and Android devices using the FortiToken Mobile (FTM ) app. l User synchronization from FGT and/or FAC to FTC—The admin user can synchronize their end users from FGT or FAC to FTC from the FGT Console or FAC GUI. The user base of record is always the Auth Client (i.e., FGT or FAC), and trumps the user base that exists in FTC (if different) prior to running the sync command. l Support for remote FortiGate users—You can configure FortiGate wildcard LDAP users to use FTC for MFA. See Configure wildcard LDAP users for FTC service on page 29 for details. l Auth client delete function from FTC—The admin user is able to delete from the FTC portal auth clients that are no longer in use. l Auto log-out—FTC automatically logs out a user when the GUI has been idle for more than ten minutes, safeguarding the security and integrity of your asset on FTC. l Real-time usage statistics—The admin user can view up-to-date usage data for the current month easily from the GUI. l Subscription-based MFA service—FTC uses a flexible SKU-based subscription mechanism to enable you to subscribe and scale your FTC MFA service with ease. l Free trial offer—FTC offers a 24-credit free trial subscription to enable potential customers to try it out before purchase. l FortiCloud SSO—Integration with FortiCloud provides unified single sign-on (SSO) access to all your Fortinet cloud service offerings. l Authentication and Management logs—FTC provides comprehensive authentication and management logs to keep you informed of all authentication and management events that have happened in your account. l Support for FGT HA clusters—FTC supports FGT and FAC HA cluster configuration. You can view your FGT and/or FAC devices in any cluster from the Auth Clients page. FortiToken Cloud 21.2.d Admin Guide 7 Fortinet Technologies, Inc. Introduction l Support for custom logo—The admin user can upload custom logo images to replace the default Fortinet banner at the bottom of the FTM app on your end-users' mobile devices.
Recommended publications
  • Blockchain and Digital Signatures for Digital Self-Sovereignty
    BLOCKCHAIN AND DIGITAL SIGNATURES FOR DIGITAL SELF-SOVEREIGNTY ____________________ A Thesis Presented to the Faculty of the Department of Computer Science University of Houston ____________________ In Partial Fulfillment of the Requirements for the Degree Masters of Science ____________________ By Brijesh B. Patel December 2018 BLOCKCHAIN AND DIGITAL SIGNATURES FOR DIGITAL SELF-SOVEREIGNTY ___________________________________________________ Brijesh B. Patel APPROVED: ___________________________________________________ Dr. Weidong Shi, Chairman Dept. of Computer Science ___________________________________________________ Dr. Nikolaos V. Tsekos Dept. of Computer Science ___________________________________________________ Dr. Chris Bronk Dept. of Information System Security ___________________________________________________ Dan Wells, Dean College of Natural Sciences and Mathematics II BLOCKCHAIN AND DIGITAL SIGNATURES FOR DIGITAL SELF-SOVEREIGNTY ____________________ An Abstract of a Thesis Presented to the Faculty of the Department of Computer Science University of Houston ____________________ In Partial Fulfillment of the Requirements for the Degree Masters of Science ____________________ By Brijesh B. Patel December 2018 III Abstract Principles of self-sovereignty have been integrated into the solution to achieve a mechanism where the user is in control of one's digital identity attributes. Through the use of attribute-based credentials, the solution presented here allows the user to control access to their digital identity attributes,
    [Show full text]
  • Multi-Factor Authentication Version: 1.0 Date: February 2017 Author: PCI Security Standards Council
    INFORMATION SUPPLEMENT Multi-Factor Authentication Version: 1.0 Date: February 2017 Author: PCI Security Standards Council INFORMATION SUPPLEMENT Guidance for Multi-Factor Authentication Table of Contents Overview ....................................................................................................................................................................1 MFA and PCI DSS .................................................................................................................................................1 Terminology ............................................................................................................................................................1 Authentication Factors ............................................................................................................................................2 Independence of Authentication Mechanisms ......................................................................................................2 Out-of-Band Authentication .....................................................................................................................................3 Cryptographic Tokens .............................................................................................................................................3 Protection of Authentication Factors .....................................................................................................................5 Multi-step vs. Multi-Factor .......................................................................................................................................5
    [Show full text]
  • Rsa Securid® Access Authenticator Choices Data Sheet
    DATA SHEET RSA SECURID® ACCESS AUTHENTICATOR CHOICES DATA SHEET When organizations have confidence their information is secure, they are empowered to use it to accelerate their business. Identity assurance creates confidence and extends user authentication from a single security measure to a continual trust model that is the basis of how an identity is used and what it can do. The RSA SecurID® authenticators are a key component of an organization’s identity assurance strategy. Trusted identities managed by RSA bring confidence to everyday transactions and support new business models providing secure access for employees, customers and partners while striking the right balance between risk, cost and convenience. One size does not fit all when it comes to choosing the right authenticator to balance your security, total cost of ownership and end-user security needs. With a broad range of easy-to-use form factors, there are RSA SecurID authenticators available to suit a wide variety of organization and application requirements. MOBILE MULTI-FACTOR AUTHENTICATION MADE EASY: Easily set up your users to use advanced mobile MFA options and allow them to use a single authenticator to access both on-premises and cloud applications on all the major mobile platforms. • RSA SecurID Authenticate App – ONE authenticator for all your authentication needs, on-premises or cloud applications for multiple clients (iOS, Android, MS Windows). • Push notification, biometrics (Fingerprint and Eyeprint), One-Time Password (OTP) are available for on-premises resources such as VPN and cloud applications such as Office 365. o Mobile multi-factor authenticators can be purchased by RSA SecurID® Access Enterprise and Premium Edition customers.
    [Show full text]
  • Multi-Factor Authentication Implementation Introduction IRS
    Multi-factor Authentication Implementation Introduction IRS Publication 1075, Tax Information Security Guidelines for Federal, State, and Local Agencies (Pub 1075) requires that all access to federal tax information (FTI) occurs from agency-owned equipment. It also requires that any remote access has multi-factor authentication implemented. Remote access, defined by Pub 1075, is any access to an agency information system by a user communicating through an external network (i.e. the internet). These requirements are more important as agencies. looking to reduce costs, allow employees to work from home or telework. Multi-factor authentication drastically reduces the risk of identity theft and unauthorized disclosure of FTI. Multi-factor authentication decreases the probability that the requestor is not the person who he says he or she is. The number of factors is important, as it implies a higher probability that presenter of the identify evidence is who they claim to be. This document explains the different authentication factors and addresses the security requirements for implementing multi-factor authentication to meet the requirements of the Office of Safeguards. Mandatory Requirements This message discusses detailed requirements that must be applied when procuring or developing various multi-factor authentication implementations. An agency may choose to implement a system appropriate to its needs, but all requirements contained in this memorandum that pertain to that implementation must be fulfilled. Multi-factor authentication is required for “all remote network access to privileged and non-privileged accounts for information systems that receive, process, store or transmit FTI” (Pub 1075, Section 9.3.7.2, Identification and Authentication (Organizational Users) (IA-2)).
    [Show full text]
  • Nexus Authentication Server Product Brief
    Nexus Authentication Server Product Brief Version: 1.2 Introduction Protecting your digital resources and services using only username and a static password as authentication method is not secure enough. Why? Passwords must be long and complex, to be less unsecure. Passwords must be changed frequently. Users often reuse the same password for different services. If a password for one service gets into the wrong hands, unauthorized people can not only get access to that service but also to a range of other services. Passwords can be easily stolen through social engineering. There is an endless range of methods, for example, convincing emails or spoofed websites where people are asked to share their username and password. And, a surprisingly large percentage of people do share their login information when asked to. Using multi-factor authentication from Nexus dramatically mitigates the risk of unauthorized people getting access to services and information. As part of Nexus Hybrid Access Gateway, the Authentication Server provides a unique solution for enabling trusted authentication, without the complexity of distributing and maintaining hardware security tokens. Using Nexus solution, organizations can empower their users with authentication technology that is easy to use, easy to manage, cost effective and secure, to enforce strong multi-factor authentication. Enable strong user authentication throughout the organization and customer base without the complexity of distributing hardware security tokens. What is multi-factor Authentication?
    [Show full text]
  • Two-Factor Authentication: Selecting and Implementing a Two-Factor
    DEGREE PROJECT IN COMPUTER ENGINEERING, FIRST CYCLE AND DEGREE PROJECT IN INFORMATION AND COMMUNICATION TECHNOLOGY, FIRST CYCLE STOCKHOLM, SWEDEN 2017 Two-Factor Authentication Selecting and implementing a two- factor authentication method for a digital assessment platform NIKLAS TELLINI and FREDRIK VARGAS KTH ROYAL INSTITUTE OF TECHNOLOGY INFORMATION AND COMMUNICATION TECHNOLOGY Two-Factor Authentication Selecting and implementing a two-factor authentication method for a Digital Assessment Platform Niklas Tellini and Fredrik Vargas 2017-05-31 Bachelor’s Thesis Examiner Gerald Q. Maguire Jr. Academic adviser Anders Västberg KTH Royal Institute of Technology School of Information and Communication Technology (ICT) Department of Communication Systems SE-100 44 Stockholm, Sweden Abstract | i Abstract Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. In this project, we analyze different methods in which 2FA could be implemented by a Digital Assessment Platform. These platforms allow test assessments to be built directly into digital content; therefore, an important requirement of these systems is secure authentication. Moreover, it is important to securely protect teachers’ account in order to avoid unauthorized people gaining access to those accounts. We investigate how 2FA could be used to add an extra layer of security to teachers’ accounts, focusing on cost, user experience, ease of use, and deployment of the solution.
    [Show full text]
  • RSA Securid Software Token New User Quick Start Guide
    RSA SecurID® Software Token New User Quick Start Guide Installing the App for Apple iOS and Android Importing a Software Token Generating a Software Token Code This guide is confidential and proprietary to J.P. Morgan and is provided for your general information only. It is subject to change without notice and is not intended to be legally binding. All services described in this guide are subject to applicable laws and regulations and service terms. Not all products and services are available in all locations. Eligibility for particular products and services will be determined by JPMorgan Chase Bank, N.A. or its affiliates. J.P. Morgan makes no representation as to the legal, regulatory or tax implications of the matters referred to in this guide. J.P. Morgan is a marketing name for the Treasury Services and Merchant Services businesses of JPMorgan Chase Bank, N.A., member FDIC, and its affiliates worldwide. ©2019 JPMorgan Chase & Co. All rights reserved. July 2019 Overview J.P. Morgan Access® clients that use RSA SecurID® security tokens now have a new software token option available that will enable users to generate a token code from an Apple® iOS® or Android™ mobile device using the RSA SecurID Software Token App. Getting Started Check with your Security Administrator to make sure they have taken the necessary steps in Administration Credential Management to move you onto an RSA Software Token, including validation of your correct Mobile Phone Number in Credential Management. You must have a mobile number in your Access profile before a software token is assigned to you.
    [Show full text]
  • RSA Securid Software Token 5.0 for Windows Provisioning Guide
    RSA SecurID® Software Token 5.0 for Windows Provisioning Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa. License Agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Third-Party Licenses This product may include software developed by parties other than RSA. The text of the license agreements applicable to third-party software in this product may be viewed on the product documentation page on RSA SecurCare Online. By using this product, a user of this product agrees to be fully bound by terms of the license agreements.
    [Show full text]
  • RSA Securid® Access Authenticator Choice
    DATA SHEET RSA SecurID® Access Authenticator choice The choice is yours For many decades, customers have trusted the one-time password (OTP) technology delivered by RSA SecurID®, available in a broad range of easy-to-use form factors. Now, RSA is making the choice easier than ever by supporting new and emerging standards and offering the broadest portfolio of authentication methods for any use case, on-premises or in the cloud. To suit a wide variety of organization and application requirements, RSA SecurID Access offers the following authentication methods: Multi-Factor Authentication (MFA) Mobile App Quickly set up advanced mobile MFA options and give users a single authenticator to access both on-premises and cloud applications on all the major mobile platforms (iOS, Android, Microsoft Windows). The RSA SecurID Authenticate App provides convenient authentication methods, such as push notification, device biometrics, FIDO and OTP, to seamlessly access on-premises (e.g., virtual private network/VPN) or cloud applications (e.g., Microsoft 365). Fast IDentity Online (FIDO) Authentication As a U2F and FIDO2 certified vendor, RSA enables a passwordless experience with the broadest support for FIDO authentication, including hardware, software, wearable and embedded options. Software Deploy RSA SecurID software tokens on mobile devices, desktops and laptops, and make strong authentication a convenient part of doing business. RSA SecurID software tokens are available for the following platforms: RSA SecurID Software Token for Microsoft Windows®, RSA SecurID Software Token for macOS X®, RSA SecurID Software Token for iOS, RSA SecurID Software Token for Android™, RSA SecurID Software Token Converter, and more. Hardware Protect sensitive data and mission-critical systems with the industry’s highest-quality two-factor authentication device, the RSA SecurID hardware token.
    [Show full text]
  • Testing Multi-Factor Authentication Introduction You Have Been Asked to Test the New Multi-Factor Authentication (MFA) Solution for Valero
    Testing Multi-Factor Authentication Introduction You have been asked to test the new multi-factor authentication (MFA) solution for Valero. Multi-factor authentication means you will be using a device (a token) that generates a one-time password, or OTP, in addition to your regular network login. The one-time password is a six digit number and changes every thirty seconds. This one-time password increases the security of your account because someone can’t login with your account remotely without your one-time password. You will be assigned a MFA token, otherwise known as a DIGIPASS. There are two versions available, a physical, or hard, token, and a mobile, or soft, token. The hard token is a small device that can be attached to a keychain and has a simple button to press that displays a one-time password. The soft token is an app that you install on a smartphone or tablet and works in the same way the hard token does. You tap the button and it displays a one-time password. Figure 1: DIGIPASS hard token Figure 2: DIGIPASS software token To test MFA, we are asking you to use a special version of the new Go2.valero.com site. Please use this site in place of the regular site while you are testing. During the testing period, you will still be able to switch back to the standard Go2 page if you run into any issues. Email any issues to [email protected]. You should have received a number of documents as part of this testing.
    [Show full text]
  • RSA Authentication Manager 7.1 Administrator's Guide
    RSA Authentication Manager 7.1 Administrator’s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo are registered trademarks of RSA Security Inc. in the United States and/or other countries. For the most up-to-date listing of RSA trademarks, go to www.rsa.com/legal/trademarks_list.pdf. EMC is a registered trademark of EMC Corporation. All other goods and/or services mentioned are trademarks of their respective companies. License agreement This software and the associated documentation are proprietary and confidential to RSA, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by RSA. Third-party licenses This product may include software developed by parties other than RSA. The text of the license agreements applicable to third-party software in this product may be viewed in the thirdpartylicenses.html files. Note on encryption technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product.
    [Show full text]
  • Service Provider Administrator Guide
    Service Provider Administrator Guide Powerful Authentication Management for Service Providers and Enterprises Version 3.2 Authentication Service Delivery Made EASY™ SafeNet Authentication Service Service Provider Administrator Guide Copyright © 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate. SafeNet, Inc. is not responsible for any direct or indirect damages or loss of business resulting from inaccuracies or omissions. The specifications contained in this document are subject to change without notice. SafeNet and SafeNet Authentication Service are either registered with the U.S. Patent and Trademark Office or are trademarks of SafeNet, Inc., and its subsidiaries and affiliates, in the United States and other countries. All other trademarks referenced in this Manual are trademarks of their respective owners. SafeNet Hardware and/or Software products described in this document may be protected by one or more U.S. Patents, foreign patents, or pending patent applications. Please contact SafeNet Support for details of FCC Compliance, CE Compliance, and UL Notification. Support SafeNet technical support specialists can provide assistance when planning and implementing SafeNet Authentication Service. In addition to aiding in the selection of the appropriate authentication products, SafeNet can suggest deployment procedures that will provide a smooth, simple transition from existing access control systems and a satisfying experience for network users. We can also help you leverage your existing network equipment and systems to maximize your return on investment. SafeNet works closely with channel partners to offer worldwide Technical Support services. If you purchased this product through a SafeNet channel partner, please contact your partner directly for support needs.
    [Show full text]