Using manual (drag and drop) registration ....................................... 17
Managing applications and credentials ............................................................. 17
Modifying application properties ....................................................... 17
Removing an application from Single Sign On ................................. 17
Exporting an application ................................................................... 18
Importing an application ................................................................... 18
Modifying credentials ........................................................................ 18
Using Application Protection .............................................................................................. 19
Restricting access to an application .................................................................. 19
Removing protection from an application .......................................................... 19
Changing restriction settings for a protected application .................................. 19
Advanced tasks (administrator only) .................................................................................................. 21
Specifying how users and administrators log on ............................................................... 21
Configuring custom authentication requirements .............................................................. 21
Configuring credential properties ....................................................................................... 22
Configuring Credential Manager settings .......................................................................... 22
Example 1—Using the “Advanced Settings” page to allow Windows logon
from Credential Manager .................................................................................. 23
Example 2—Using the “Advanced Settings” page to require user verification
before Single Sign On ....................................................................................... 23
3 Embedded Security for HP ProtectTools
Setup procedures ............................................................................................................................... 25
Enabling the embedded security chip ................................................................................ 25
Initializing the embedded security chip .............................................................................. 25
Setting up the basic user account ...................................................................................... 26
General tasks ..................................................................................................................................... 27
Using the Personal Secure Drive ....................................................................................... 27
Encrypting files and folders ................................................................................................ 27
Sending and receiving encrypted e-mail ............................................................................ 27
Changing the Basic User Key password ........................................................................... 27
Advanced tasks .................................................................................................................................. 28
Backing up and restoring ................................................................................................... 28
Creating a backup file ....................................................................................... 28
Restoring certification data from the backup file ............................................... 28
Changing the owner password .......................................................................................... 28
Resetting a user password ................................................................................................ 28
Enabling and disabling Embedded Security ...................................................................... 28
Permanently disabling Embedded Security ...................................................... 29
Enabling Embedded Security after permanent disable ..................................... 29
Migrating keys with the Migration Wizard .......................................................................... 29
4 Java Card Security for HP ProtectTools
General tasks ..................................................................................................................................... 31
Changing a Java Card PIN ................................................................................................ 31
Selecting the card reader ................................................................................................... 31
Advanced tasks (administrators only) ................................................................................................ 32
Assigning a Java Card PIN ................................................................................................ 32
Assigning a name to a Java Card ...................................................................................... 32
Setting power-on authentication ........................................................................................ 32
Enabling Java Card power-on authentication and creating an administrator
Java Card .......................................................................................................... 33
Creating a user Java Card ................................................................................ 33
iv