- 1. Introduction
- 2. HIN Access Gateway
❱
- 2.1. Overview
- 2.2. AGW registration
- 2.3. Access to an HIN-protected site
- 2.4. The link between an AD login and an HIN identity
- 2.5. Trust level concept
- 2.6. Second factor for trust level 3 applications
- 2.7. Identity reference/packages
- 2.8. System administration
- 3. Commissioning
❱
- 3.1. Overview
- 3.2. Verifying the AGW image checksum
- 3.3. Preparation for commissioning
❱
- 3.3.1. Creating an A record / Requesting a certificate
- 3.3.2. Activating ports
- 3.3.3. Settings for video identification
- 3.4. Integration into the company network
- 3.5. Activation of the HIN access gateway
- 4. Configuration of the HIN access gateway
❱
- 4.1. Overview
- 4.2. Status
- 4.3. System configuration
❱
- 4.3.1. Network configuration
- 4.3.2. Active Directory Access
- 4.3.3. Group Mapping
- 4.3.4. Upstream Proxy
- 4.3.5. Time
- 4.3.6. Monitoring
- 4.3.7. Notification service
- 4.4. SSL
- 4.5. AGW Registration
- 4.6. Administration
❱
- 4.6.1. Online backup
- 4.6.2. Software updates
- 4.6.3. Support Connection
- 4.6.4. Buttons
- 4.7. Clusters
❱
- 4.7.1. Activating clusters
- 4.7.2. Adding nodes
- 4.7.3. Removing nodes
- 4.8. Logs
- 4.9. Users
- 5. Connecting to the active directory
❱
- 5.1. Kerberos
- 6. Browser configuration
❱
- 6.1. Internet Explorer
- 6.2. Firefox
- 7. Testing
❱
- 7.1. Access to HIN-protected sites
- 7.2. Internet access
- 7.3. Internet access
- 8. Frequently asked questions