Authentication technologies in HP ProtectTools HP client PCs support a breadth of authentication devices in the Microsoft® Windows® operating system environment, as well as the pre-boot environment. This breadth of support for authentication devices gives customers a range of choices on which authentication technology to deploy.
Credential Manager for HP ProtectTools currently supports the following authentication technologies: Credential Password Trusted Platform Module (TPM) Smart card USB token Biometric Fingerprint Virtual token Password authentication Passwords are the most common form of user authentication currently in use. Passwords require little or no unique infrastructure to implement and are useful for deterring casual access.
HP also utilizes TPM authentication to enhance Drivelock security, by utilizing the TPM to generate a strong 2048 bit Drivelock password. In addition to improving security, this feature also improves overall system usability as authenticating to the TPM during boot also unlocks Drivelock, effectively linking the hard drive to the platform.
Note: In addition to PKI support, HP ProtectTools also provides the means to more securely store user authentication credentials like passwords and therefore does not require additional PKI infrastructure elements.
PKI deployments in a corporation and provide functionality such as email signing and data encryption. Note: In addition to PKI support, HP ProtectTools also provides the means to more securely store user authentication credentials like passwords and therefore does not require additional PKI infrastructure elements.
4. Registry 5. USB drive keys Once a token has been created, Credential Manager for HP ProtectTools can use it to authenticate the user. Example: A user can create a virtual token on a USB drive key, and configure Credential Manager for HP ProtectTools to require that virtual token for authentication.
Suitability to Task Each authentication device provides a tradeoff between ease of use, administrative complexity and level of security. The following graph visually represents where these devices fit in the administrative complexity versus level of security spectrum. Three factor (Biometric, Token and PIN) Hardware Token (Smartcard, USB) with PKI...
Need help?
Do you have a question about the Compaq NC4010 and is the answer not in the manual?
Questions and answers