Symbol MC50 User Manual page 107

Hide thumbs Also See for MC50:
Table of Contents

Advertisement

Authentication
Kerberos
Kerberos is a form of 128-bit data security. A Kerberos server must authenticate an adapter's request for access point resources before
(see
Figure
8-4)
the server permits the access point to transmit and receive data with the adapter.
In the KDC field, retain the default KDC name (krbtgt) unless it is changed in the server.
In the Realm field, enter the name of the server that hosts the Kerberos KDC.
The KDC is located on a server and maintains information about the access points and users it supports. The KDC also permits the
transmission and receipt of data once user credentials are verified.
Tap Kerberos Options to configure different caching modes for Kerberos credentials. When connecting to a Kerberos supported
profile, the system can prompt for the associated user name and password at specified instances during authentication. Caching of
credentials is optional.
Kerberos Options:
Select any combination of the following Kerberos Credential Caching settings:
Reset: When selected, the system prompts for the username and password upon a warm boot.
Connect: When selected, the system prompts for login information when initiating a connection to the ESSID.
Time: When selected, the system requests a user name and password after the specified time parameter. Available time parameters
are specified as an Interval (in minutes) or At (hh:mm) a specified time (chosen with the pull-down menu). If a time option is not
selected, authentication continues without a user name and password verification.
Resume: When enabled, the system prompts for username and password after the system is suspended and resumed. If disabled,
the system prompts for a username and password only if the user's credentials are not in the registry.
Authentication
LEAP
Select this option to enable LEAP authentication. LEAP is founded on mutual authentication. The AP and the connecting mobile computer
(see
Figure
8-5)
require authentication before gaining access to the network.
Table 8-3. Authentication Tab Fields - Kerberos
Figure 8-5. Mobile Companion - Authentication Tab (LEAP)
Table 8-4. Authentication Tab Fields - LEAP
Description
Description
WLAN Configuration 8-7

Advertisement

Table of Contents
loading

Table of Contents