Hand Held Products 7900 Series User Manual

Page 133

Advertising
background image

Dolphin® 7900 Series Mobile Computer User’s Guide

9 - 23

On this tab,

You…

User Settings Tab Configure

authentication

credentials and profiles.

System Settings Tab

Set the level of detail that the Client will provide in the system log and zero-config options.

Server Identity Tab

Control how the Client authenticates the server that handles the 802.1X protocol on the network side.
This applies only to the TLS, TTLS, and PEAP authentication methods and is used to tell the Client
what server credentials to accept from the authentication server to verify the server.

User Tab

The User settings tab defines the protocol and the credentials used to authenticate a user.

Field

Description

Profile

Multiple user credential profiles can be created for use when the user roams from one network to another.
The drop-down list contains existing authentication credential profiles. Select a profile from the list to edit
it in the fields that follow.

Tapping Add permits new profiles to be added to the list. A
screen appears where you can enter a name for the new
profile.

Enter a Profile name and tap OK. The name entered appears
in the Profile drop-down list.

Tapping Delete deletes authentication profiles. To be deleted,
a profile cannot be assigned to a configured network.

Identity

This is the 802.1X identity supplied to the authenticator. The identity value can be up to 63 ASCII
characters and is case-sensitive.

For tunneled authentication protocols such as TTLS and PEAP, this identity (called the Phase 1 identity)
is sent outside the protection of the encrypted tunnel. Therefore, it is recommended that this field not
contain a true identity, but instead the identity “anonymous” and any desired realm (e.g.
[email protected]). For TTLS and PEAP, true user credentials (Phase 2 identity) are entered
in the Tunneled authentication section.

Note: When used with PEAP and the .NET Enterprise Server Version 5.2, this field must contain the

identity used in both Phase I and Phase II. The Phase II identity field is ignored.

Password

This is the password used for MD5-Challenge or LEAP authentication. It may contain up to 63 ASCII
characters and is case-sensitive. Asterisks appear instead of characters for enhanced security.

Advertising