Your Server May Require Additional Or Different Authentication Steps. Follow Directions That Appear In The Dialogs.managing Ids Stored On Hardware Devices - Adobe 22002486 User Manual

For acrobat 9.0 and adobe reader 9.0
Table of Contents

Advertisement

Acrobat 9 Family of Products
Security Feature User Guide
Viewing All of Your Digital IDs 16
Viewing and Comparing Changes and Versions 122
Viewing and Editing Contact Details 42
Viewing Digital ID Certificates in the Certificate Viewer 17
Visible 58
Visible but doesn't print 58
Visio Stencil (Microsoft) 144
Visio Template (Microsoft) 144
Visio Workspace file (Microsoft) 144
Visual Studio .NET Binary-based Macro Project (Microsoft)
144
Visual Test (Microsoft) 143
W
Weblink 133
What is a Digital ID? 11
What is a timestamp? 111
What is a Trusted Identity? 30
What is Trust? 30
What Makes a Signature Valid? 100
What's in this Guide? 8
When Timestamps Can't be Verified. . . 112
Who Should Read This Guide? 8
Why Attach a File that's on the Black List? 141
Why Can't I Certify? 96
Windows Control Panel Extension (Microsoft) 142
Windows digital ID menu 26
Windows Explorer Command 143
Windows Help file 142
Windows Installer file (Microsoft) 143
Windows Installer Patch 143
Windows Program Information file (Microsoft) 143
Windows Screen Saver 143
Windows Script Component 144
Windows Script Component, Foxpro Screen (Microsoft) 143
Windows Script file 144
Windows Script Host Settings file 144
Windows SDK Setup Transform Script 143
Windows Shortcut file 142
Windows Shortcut into a Document 143
Windows System file 143
Windows Task Scheduler Task Object 142
WinRAR Compressed Archive 143
Working with Attachments 141
Working with Signature Fields 56
Y
You can customize the way a certified document behaves
for signers by giving form fields additional
features with seed values. For example, you can
preconfigure custom signing reasons or limit
signing to only those with certificates with
predefined characteristics. Certifying a Document
93
Your server may require additional or different
authentication steps. Follow directions that
appear in the dialogs.Managing IDs Stored on
Hardware Devices 27
Z
ZoneLabs ZoneAlarm Mailsafe Renamed .PIF file 144
Index
189

Advertisement

Table of Contents
loading

This manual is also suitable for:

Digital signature

Table of Contents