1. Introduction
    1. Purpose of this document
    2. Abbreviations
  2. HIN Access Gateway
    1. Overview
    2. AGW registration
    3. Access to an HIN-protected site
    4. The link between an AD login and an HIN identity
    5. Trust level concept
    6. Second factor for trust level 3 applications
    7. Identity reference/packages
    8. System administration
  3. Commissioning
    1. Overview
    2. Verifying the AGW image checksum
    3. Preparation for commissioning
      1. Creating an A record / Requesting a certificate
      2. Activating ports
      3. Settings for video identification
    4. Integration into the company network
    5. Activation of the HIN access gateway
  4. Configuration of the HIN access gateway
    1. Overview
    2. Login
      1. Initial access to the access gateway
      2. Changing password
    3. Status
    4. System configuration
      1. Network configuration
      2. Time
      3. Active Directory Access
      4. Upstream Proxy
      5. Group Mapping
      6. Notification service
    5. SSL
  5. Connecting to the active directory
    1. LDAPS
    2. Method
    3. Kerberos
    4. AGW Registration
    5. Classic Proxy
    6. Administration
      1. Online backup
      2. Software updates
      3. Support Connection
      4. Buttons
    7. Clusters
      1. Activating clusters
      2. Adding nodes
      3. Removing nodes
    8. Logs
    9. Users
  6. Browser configuration
    1. Internet Explorer
    2. Firefox
    3. Chrome
  7. Testing
    1. Access to HIN-protected sites
    2. Internet access
  8. Frequently asked questions