User`s guide
Security
Polycom, Inc. 8–27
To reset a forgotten password:
If you forget a Polycom HDX System Admin or User password, you must use
the restore button to run the setup wizard again in order to access the Admin
Settings and reset the password. For more information, refer to Using the
Restore Button on the Polycom HDX System on page 12-2.
After the system restarts, it leads you through the setup wizard. You can enter
new passwords when you set up the system.
If you forget a Polycom Touch Control Admin password, you must restore the
device to its factory configuration. For more information, refer to Performing
a Factory Restore on the Polycom Touch Control on page 12-5.
Managing Certificates and Revocation
If your organization requires a secure environment, Polycom recommends
that you have a strong understanding of certificate management before you
implement these features.
Polycom HDX systems can generate and use certificates to authenticate
network connections to and from the Polycom HDX system. Other web
applications can also generate certificates, as you might notice when you
navigate the Internet. The system uses configuration and management
techniques typical of public-key infrastructure (PKI) to manage certificates,
certificate signing requests (CSRs, sometimes also called unsigned
certificates), and revocation lists. ANSI X.509 standards regulate the
characteristics of certificates and revocation.
The certificate authority (CA) is the trusted entity that issues, or signs, digital
certificates for others, as well as the certificates associated with the CA itself.
You can manage certificates and revocation only through the Polycom HDX
web interface.
Polycom encourages you to check your system logs daily to ensure that your
installed certificates are current.
To go to the web interface:
>> Open a web browser and enter the system’s secure host name or IP
address (for example,
https://10.11.12.13
). Click Yes in the security
dialog boxes that appear.
Working with Certificates
Certificates are authorized externally when they are signed by the CA. The
certificates can be automatically validated when they are used to establish an
authenticated network connection, that is, the certificate is validated when it is
used.