- 1. Introduction
- 1.1. Purpose of this document
- 1.2. Abbreviations
- 2. HIN Access Gateway
- 2.1. Overview
- 2.2. AGW registration
- 2.3. Access to an HIN-protected site
- 2.4. The link between an AD login and an HIN identity
- 2.5. Trust level concept
- 2.6. Second factor for trust level 3 applications
- 2.7. Identity reference/packages
- 2.8. System administration
- 3. Commissioning
- 3.1. Overview
- 3.2. Verifying the AGW image checksum
- 3.3. Preparation for commissioning
- 3.3.1. Creating an A record / Requesting a certificate
- 3.3.2. Activating ports
- 3.3.3. Settings for video identification
- 3.4. Integration into the company network
- 3.5. Activation of the HIN access gateway
- 4. Configuration of the HIN access gateway
- 4.1. Overview
- 4.2. Login
- 4.2.1. Initial access to the access gateway
- 4.2.2. Changing password
- 4.3. Status
- 4.4. System configuration
- 4.4.1. Network configuration
- 4.4.2. Time
- 4.4.3. Active Directory Access
- 4.4.4. Upstream Proxy
- 4.4.5. Group Mapping
- 4.4.6. Notification service
- 4.5. SSL
- 5. Connecting to the active directory
- 5.1. LDAPS
- 5.2. Method
- 5.3. Kerberos
- 5.4. AGW Registration
- 5.5. Classic Proxy
- 5.6. Administration
- 5.6.1. Online backup
- 5.6.2. Software updates
- 5.6.3. Support Connection
- 5.6.4. Buttons
- 5.7. Clusters
- 5.7.1. Activating clusters
- 5.7.2. Adding nodes
- 5.7.3. Removing nodes
- 5.8. Logs
- 5.9. Users
- 6. Browser configuration
- 6.1. Internet Explorer
- 6.2. Firefox
- 6.3. Chrome
- 7. Testing
- 7.1. Access to HIN-protected sites
- 7.2. Internet access
- 8. Frequently asked questions