User`s guide

Introduction
1/2 MASTER USER’S GUIDE
How is the system configured?
The security system is configured by using the LOC Technology
Setup utility which is held in the Security Card’s read-only memory.
LOC Technology Setup can be started whenever the computer is
turned on or rebooted, by pressing
ALT+S when prompted to do so.
The security system can prevent individual users accessing the
utility.
How do users logon to the computer?
The security system obliges users to logon every time the computer
is turned on or rebooted.
For a fully-authenticated logon the user must present three items:
A hand-held infrared device called a KeyLOC card
A user name
A password
In situations where full authentication is deemed unnecessary, either
the KeyLOC card or the user name and password may be omitted.
In addition, the user can be assigned logon periods that specify on
what days of the week, and between what times, he is permitted to
logon (for example, from 9:00 to 17:30, Monday to Friday).
A user is usually permitted to change his password when he logs on.
He may also be forced to change his password every few days.
Alternatively, a user may be barred from changing his password
altogether.
The security system also supports a “Quick Logon” facility. This
allows the creation of one user account which does not require any
authentication at logon. This could be useful in situations where the
computer has a majority of users with identical security
requirements. These users would rely on the Quick Logon account,
whereas fully- or partially-authenticated logons would be reserved
for special users such as Master users (see below).