DKey Authentication 100

sanjigerma Lv3Posted 17 Oct 2022 12:29

I am not familiar with Dkey Authentication so what is the best scenario to use this authentication?

rivsy has solved this question and earned 10 coins.

Posting a reply earns you 2 coins. An accepted reply earns you 20 coins, 100 coins of bounty and another 10 coins for replying within 10 minutes. (Expired) What is Coin?

Enter your mobile phone number and company name for better service. Go

The users adopting DKey authentication need submit the user information saved in DKey to IAM device,
which will then identify the user according to the DKey authentication information. Among the four authentications, the DKey authentication has the highest priority. If you insert the DKey into a computer
that is already authenticated using other method, the identity of the computer will be changed into DKey
user with the corresponding privileges.
There are two types of DKey: One is authentication DKey; the other is audit-free DKey. The audit-free
DKey has not only the authentication function, but also the privilege to be exempt from being audited by
the IAM device, which means the IAM device will not monitor nor record the behaviors of the audit-free
DKey user
Is this answer helpful?
Newbie517762 Lv5Posted 17 Oct 2022 12:50
  
HiHi,

Please find the attahced file for DKEY Authentication Introduction.
Hope it can help you.

Regards,
DKEY Authentication Introdution.pdf (616.23 KB, Downloads: 565)
rivsy Lv5Posted 17 Oct 2022 14:17
  
The users adopting DKey authentication need submit the user information saved in DKey to IAM device,
which will then identify the user according to the DKey authentication information. Among the four authentications, the DKey authentication has the highest priority. If you insert the DKey into a computer
that is already authenticated using other method, the identity of the computer will be changed into DKey
user with the corresponding privileges.
There are two types of DKey: One is authentication DKey; the other is audit-free DKey. The audit-free
DKey has not only the authentication function, but also the privilege to be exempt from being audited by
the IAM device, which means the IAM device will not monitor nor record the behaviors of the audit-free
DKey user
RegiBoy Lv5Posted 17 Oct 2022 14:24
  
The use of DKEY Authentication is to authenticate users using Pendrive or FLashdrive. There are two types of DKey: One is authentication DKey; the other is audit-free DKey.
Zonger Lv4Posted 17 Oct 2022 14:50
  
Hello,

Users adopting DKEY authentication has to submit their user information for records which will be saved in DKEY (SANGFOR DKEY pen drive). The DKEY will then identify user according to DKEY authentication information.

Among the four authentication, DKEY authentication, DKEY authentication has the highest priority. If you insert a DKEY into a computer that has already been authenticated using other method, the identity of thecomputer will be changed to DKEY user automatically with its corresponding privileges.

There are two types of DKEY. One is authentication DKEY and the other is audit-free DKEY. The audit-freeDKEY has not only authentication function, but also the privilege to exempt from being audited by IAG. Thedevice will not monitor nor record user behaviors with audit-free DKEY.
Luih Miranda Lv3Posted 24 Oct 2022 11:09
  
The users adopting DKey authentication need submit the user information saved in DKey to IAM device,
which will then identify the user according to the DKey authentication information. Among the four authentications, the DKey authentication has the highest priority. If you insert the DKey into a computer
that is already authenticated using other method, the identity of the computer will be changed into DKey
user with the corresponding privileges.
There are two types of DKey: One is authentication DKey; the other is audit-free DKey. The audit-free
DKey has not only the authentication function, but also the privilege to be exempt from being audited by
the IAM device, which means the IAM device will not monitor nor record the behaviors of the audit-free
DKey user
Faisal P Posted 24 Oct 2022 12:25
  
The DKey software was developed in order to alleviate this problem. A taxonomic key in text format can be imported to the software in order to edit it. Various editing options are possible, including: moving couplets, removing couplets, combining keys and renumbering keys.
Naomi Lv3Posted 24 Oct 2022 13:12
  
The use of DKEY Authentication is to authenticate users using USB FLashdrive.
VanFlyheights Lv3Posted 24 Oct 2022 13:29
  
DKey authentication has the highest priority. If you insert the DKey into a computer
that is already authenticated using other method, the identity of the computer will be changed into DKey
user with the corresponding privileges.
Adonis001 Lv3Posted 24 Oct 2022 13:51
  
There are two types of DKEY. One is authentication DKEY and the other is audit-free DKEY. The audit-freeDKEY has not only authentication function

I Can Help:

Change

Moderator on This Board

11
54
1

Started Topics

Followers

Follow

15
21
3

Started Topics

Followers

Follow

Board Leaders