Zonger Lv4Posted 17 Oct 2022 14:50
  
Hello,

Users adopting DKEY authentication has to submit their user information for records which will be saved in DKEY (SANGFOR DKEY pen drive). The DKEY will then identify user according to DKEY authentication information.

Among the four authentication, DKEY authentication, DKEY authentication has the highest priority. If you insert a DKEY into a computer that has already been authenticated using other method, the identity of thecomputer will be changed to DKEY user automatically with its corresponding privileges.

There are two types of DKEY. One is authentication DKEY and the other is audit-free DKEY. The audit-freeDKEY has not only authentication function, but also the privilege to exempt from being audited by IAG. Thedevice will not monitor nor record user behaviors with audit-free DKEY.

I Can Help:

Change

Moderator on This Board

15
21
3

Started Topics

Followers

Follow

Board Leaders