Authenticating the Agents

As a system administrator, follow these steps to configure your system to apply the level of security that is appropriate for your company.

  1. Define the method that will be used to authenticate the Agents. This determines the level of security. See Setting the Authenticating Method.

  2. Define the method that will be used to generate the Authentication Key. See Setting the Method to Generate the Authentication Key.

  3. Authenticate the Agents using the defined method. See Authenticating.

  4. If an Agent is compromised or if you want to upgrade it, you must first withdraw its authentication. See Withdrawing the Authentication.

  5. In some cases you will have to renew the Transfer Key, for example after an Agent upgrade. See Renewing the Transfer Key.

  6. If necessary, you can change the authentication method later on. See Changing the Authentication Method.

See also: