5

Overview

Overview

You should deploy the Soft-PK installation program with a customized

 

security policy and the necessary digital certificates. Custom

 

installations are designed to make it easy to manage corporate

 

security policies for tens, hundreds, or thousands of end users.

 

Along with the necessary software and files, you should provide

 

specific Soft-PK installation and setup instructions for each end user.

 

This facilitates management of corporate security policies for your end

 

users and simplifies what the end user must do.

 

The Soft-PK product CD provided by Secure Computing includes a

 

file (userworksheet.doc) in MS Word format that you can customize

 

and send to users.

Figure 5-1. Sample

 

 

 

 

 

 

userworksheet.doc file

 

 

 

contained on Soft-PK

 

 

 

product CD

 

 

 

 

 

 

Word

 

 

 

format

 

 

 

 

This worksheet contains five main sections that you should edit and save before distributing to end users. These sections are based on the information presented in earlier chapters in this manual.

￿Dial-up network instructions

￿Soft-PK installation instructions

￿Certificate instructions

￿Security policy instructions

￿Basic connection instructions

5-2

Deploying Soft-PK to Your End Users

Page 70
Image 70
Secure Computing Sidewinder Version 5.1.0.02, SafeNet, Soft-PK Version 5.1.3 Build 4 manual Overview, Word, Format