Product manual

28
Windows Server 2003:
1. Click “Start” -> “All Programs ->Windows Support Tools” -> “Command Prompt”
2. Typehttpcfg query ssl -i 0.0.0.0:8001 and press theEnter key
3. Copy and paste theHash field somewhere safe, in case you want to re-add the existing certificate
4. Typehttpcfg delete ssl –i 0.0.0.0:8001” and press theEnter” key
5. You should seeHttpDeleteServiceConfiguration completed with 0.”
6. Typehttpcfg set ssl –i 0.0.0.0:8001 g {BA5393F7-AEB1-4AC6-B759-1D824E61E442} –h <THUMBPRINT>, replacing
<THUMBPRINT> with the values from the certificate thumbprint without any spaces and press theEnter” key
7. You should seeHttpSetServiceConfiguration completed with 0
8. Restart the ESET Secure Authentication Core service for the new certificate to take effect
Windows Server 2008+
Click “Start” -> Type “cmd.exe”
In the list of programs, right-click thecmd.exe” item and select “Run as administrator
Typenetsh http show sslcert ipport=0.0.0.0:8001” and press the Enter” key
Copy and paste theCertificate Hash field somewhere safe, in case you want to re-add the existing certificate
Typenetsh http delete sslcert ipport=0.0.0.0:8001 and press the “Enter key
You should seeSSL Certificate successfully deleted”
Typenetsh http add sslcert ipport=0.0.0.0:8001 appid={BA5393F7-AEB1-4AC6-B759-1D824E61E442}
certhash=<THUMBPRINT>”, replacing <THUMBPRINT> with the values from the certificate thumbprint without any spaces and
press the “Enter key
You should seeSSL Certificate successfully added”
Restart the ESET Secure Authentication Core service for the new certificate to take effect
10. Advanced User Management
The ESET Secure Authentication tab for a user in the ADUC is divided into four sections:
User State (indicated by a colored flag for quick reference)
Enabled Token Types (check boxes)
Administrator Actions (buttons)
Auditing Data (text data indicating authentication events)