1. |
On the left navigation pane, click Settings > Control Panel to display the Control Panel, then click Security to display the Security Settings page. |
2. |
3. |
4. |
5. |
The secure web browser using https is available.
1. |
On the left navigation pane, click Settings > Control Panel to display the Control Panel, then click Security to display the Security Settings page. |
2. |
Click Enable SSL to use a new certificate or a valid self-signed SSL certificate. Note that Quest KACE does not recommend using a self-signed certificate. |
1. |
▪ |
1. |
On the left navigation pane, click Settings > Control Panel to display the Control Panel, then click Security to display the Security Settings page. |
2. |
4. |
The HTTPS browser is now unavailable.
Start by installing the authenticator app on your mobile Android or iOS device. You can download the app from Google Play and Apple App Store.
NOTE: Using the reset_admin_password command to reset the administrator's password also resets the 2FA token. For more information about this command, see Use the Command Line Console to reset the Administrator's password. |
1. |
On the left navigation pane, click Settings > Control Panel to display the Control Panel, then click Security to display the Security Settings page. |
2. |
On the Security Settings page, under Two-Factor Authentication, select Enable Two-Factor Authentication. |
3. |
4. |
d. |
e. |
a. |
On the left navigation pane, click Settings > Control Panel to display the Control Panel, then click Security to display the Security Settings page. |
b. |
When you enable 2FA on the appliance, only those users who have 2FA enabled can log in using this additional layer of security. To enforce 2FA for all users logging into the appliance, under Two-Factor Authentication, select Require Two-Factor Authentication for all users. This option overrides the 2FA configuration associated with individual user accounts. For more information, see Add or edit local administrator accounts. |
c. |
To specify the length of time during which users who require 2FA can bypass 2FA authentication, under Transition Window, specify the desired time period. This way, for example, if a user leaves their phone at home and cannot generate a new code, they can still access the appliance during the specified amount of time. |
6. |
© ALL RIGHTS RESERVED. Conditions d’utilisation Confidentialité Cookie Preference Center