Setup guide

UNCLASSIFIED
7. Click on the name of the newly created keychain to highlight it.
Chapter 6 -
Future Guidance
8. Select Change Settings for keychain “mail_keychain” … from the Edit
menu.
9. Make sure the Lock when sleeping option is selected, and that the Lock
after x minutes of inactivity option is not selected (Figure 33).
Figure 33: Settings for “mail_keychain”
10. Move any items containing credentials for mail applications, or any other
items to be protected by this keychain, into the newly created keychain. This
can either be done using the Cut and Paste features from the Edit menu, or
by selecting the item to be moved, and dragging it over the new keychain.
Keychain Access will then prompt for the keychain password of the
keychain originally containing the item. Enter the password and click the
Allow Once button. The item should appear in the item list for the new
keychain, and should no longer appear in the original keychain.
11. Configure all items now in this keychain. Select an item in the list, and click
on Access Control. Make sure both Confirm Before Allowing Access
and the Ask for keychain password are selected. Remove any entries in
the access list other than the application that should be allowed to use the
credential automatically. Repeat this step for all items in the list (Figure 34).
UNCLASSIFIED
81