Vip access credential id6/22/2023 Note: Symantec VIP Support team is unable to register or change credential IDs for users. A user can resume 2-factor authentications only after registering the Credential ID.įor additional information, please see VIP Access token, mobile or desktop credential Q&A help. If available, users can perform this action through their organization's VIP Self-Service or My VIP portal. If the VIP Access app is installed onto a new device, or the app was uninstalled and reinstalled, reach out to the vendor or organization of the resource being accessed to remove the old credential and register the new credential to the user. This includes restoring a full device backup from one device to another. Vodafone has deployed Symantec Validation and Identity Protection (VIP) for. To protect the identity of the user assigned to a credential, the VIP Access app prevents a credential ID from being copied or transferred from one device or app to another. Each credential ID is associated with a particular user and is used when accessing protected resources and online transactions. ![]() By default, this is set to User Alias.A VIP Access credential ID protects accounts and identities by providing a one-time password (OTP) during user logins within an organization. Under Symantec VIP User ID, select the identity attribute that represents the users' User ID in Symantec VIP. In most cases, you will select Production. Under Endpoint, choose the type of endpoint you are pointing to. For hardware tokens, validate the Credential ID using the six-digit code security code. You can choose to test with a security code as well. Select Import to upload the Client Certificate you created within Symantec VIP.Įnter the Certificate Password you configured when you generated the certificate. On the VIP website: Click Test Enter your Credential ID and click Continue If your device is Push enabled, you receive a Push notification on your device. Under Integration Settings, select Enable Symantec VIP Integration. In the Admin interface, go to Connections > Integrations > Symantec VIP. If you want your users to be able to use Symantec VIP Push notifications for strong authentication, the Enable Mobile Push option must be globally enabled on the VIP Policy Configuration page within Symantec VIP.Ĭomplete the following step to integrate Symantec VIP in IdentityNow: You will need this later in IdentityNow.ĭownload the certificate to a known location. In Symantec VIP, request a new VIP Certificate in PKCS#12 format.Ĭomplete the other required fields in the Symantec interface and note the certificate password. The Symantec VIP Security Code method can be enabled for strong authentication, account unlock, or password reset.Ĭomplete the following steps to set up and configure Symantec VIP: The Symantec VIP Push method can be enabled for strong authentication. If a user has not enrolled in Symantec VIP or has not registered an Access Credential, the Symantec VIP strong authentication and password reset options do not appear within IdentityNow. ![]() If a user's account is disabled within Symantec VIP, they do not see options to use Symantec VIP within IdentityNow. Once you enable this integration in IdentityNow, you can configure it as a strong authentication, account unlock, or password reset method for your identity profiles.Ĭertain Symantec VIP configuration options might affect your users' experience in IdentityNow, as follows: You can configure Symantec VIP to integrate with IdentityNow and give your users additional strong authentication options.Ĭonfiguring IdentityNow to use Symantec VIP strong authentication requires a certain amount of work outside of the IdentityNow admin interface.
0 Comments
Leave a Reply. |