
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006
Page 2 of 62
Table of Contents
Introduction....................................................................................................................................4
Your XyLoc Package...............................................................................................................................4
Support Information.................................................................................................................................4
XyLoc Core Functionality........................................................................................................................5
XyLoc Solo Overview ....................................................................................................................6
The XyLoc System...................................................................................................................................6
XyLoc Product Architecture ....................................................................................................................7
How XyLoc Works........................................................................................................................................... 7
XyLoc Secure Login and Password Overview.........................................................................................8
Windows 2000/XP............................................................................................................................................ 8
XyLoc Password ............................................................................................................................................... 8
Getting Started...............................................................................................................................9
Using the XyLoc Lock.............................................................................................................................9
Installing the XyLoc Lock (USB)............................................................................................................9
Placement of the XyLoc Lock........................................................................................................................... 9
The XyLoc Lock Status Light......................................................................................................................... 11
Using the XyLoc Key.............................................................................................................................12
Installing the XyLoc Software ...............................................................................................................14
Understanding Core Settings..................................................................................................................27
Administrative Levels..................................................................................................................................... 27
Administrator .......................................................................................................................................... 27
User......................................................................................................................................................... 28
Guest ....................................................................................................................................................... 28
AutoLogon...................................................................................................................................................... 28
Authentication Methods.................................................................................................................................. 28
Login Authentication............................................................................................................................... 28
Unlock Authentication ............................................................................................................................ 29
Configuring the XyLoc Software...........................................................................................................30
Security Configuration and User Preferences.................................................................................................. 30
User Setup....................................................................................................................................................... 31
User Name............................................................................................................................................... 31
Add User… ............................................................................................................................................. 32
What It Does:.........................................................................................................................................32
Delete User….......................................................................................................................................... 32
Key ID..................................................................................................................................................... 32
Add Key….............................................................................................................................................. 32
Delete Key…........................................................................................................................................... 32
Login Authentication............................................................................................................................... 32
Allow Password Override (No Key) ....................................................................................................... 33
Unlock Authentication ............................................................................................................................ 34
Allow Password Override (No Key) ....................................................................................................... 34
Unlock to Key Only for up to xseconds/minutes.................................................................................... 34
Range ...................................................................................................................................................... 35
Range Refinement................................................................................................................................... 35
Personal Name ........................................................................................................................................ 35
Advanced Settings................................................................................................................................... 35
Advanced User Settings.................................................................................................................................. 36
Administrative Level............................................................................................................................... 36
Auto Logoff Time ................................................................................................................................... 37
User can logoff locked workstation......................................................................................................... 37
Key ID..................................................................................................................................................... 37
Pass Key.................................................................................................................................................. 38
Beep When Locking................................................................................................................................ 38
Lock if the Key is Stationary for............................................................................................................. 38
Note: Ensure recommends the 1-minute option for demonstration purposes only................................38