1. Introduction
  2. HIN Access Gateway
    1. Overview
    2. AGW registration
    3. Access to an HIN-protected site
    4. The link between an AD login and an HIN identity
    5. Trust level concept
    6. Second factor for trust level 3 applications
    7. Identity reference/packages
    8. System administration
  3. Commissioning
    1. Overview
    2. Verifying the AGW image checksum
    3. Preparation for commissioning
      1. Creating an A record / Requesting a certificate
      2. Activating ports
      3. Settings for video identification
    4. Integration into the company network
    5. Activation of the HIN access gateway
  4. Configuration of the HIN access gateway
    1. Overview
    2. Status
    3. System configuration
      1. Network configuration
      2. Active Directory Access
      3. Group Mapping
      4. Upstream Proxy
      5. Time
      6. Monitoring
      7. Notification service
    4. SSL
    5. AGW Registration
    6. Administration
      1. Online backup
      2. Software updates
      3. Support Connection
      4. Buttons
    7. Clusters
      1. Activating clusters
      2. Adding nodes
      3. Removing nodes
    8. Logs
    9. Users
  5. Connecting to the active directory
    1. Kerberos
  6. Browser configuration
    1. Internet Explorer
    2. Firefox
  7. Testing
    1. Access to HIN-protected sites
    2. Internet access
    3. Internet access
  8. Frequently asked questions