¿Le pareció útil este contenido?
¿Cómo podríamos hacer que este artículo sea más útil?
With Lyve Token Security, members entrusted with security management provide product end users with unlockers (Lyve Token files) that allow access to specific Lyve Mobile Arrays in the subscription. Unlockers can authorize device access without a connection to Lyve Management Portal or the internet.
There are two types of unlockers:
Software unlockers | A software unlocker is a client computer installed with the Lyve Client app. The software unlocker authorizes that instance of Lyve Client to access specific Lyve Mobile Arrays in the subscription. |
Hardware unlockers | A hardware unlocker authorizes a device (a Lyve Mobile Padlock or Lyve Mobile Link) to unlock specific Lyve Mobile Arrays in the subscription. |
For more information on Lyve Token files and accessing devices with software and hardware unlockers, see the Lyve Mobile Security User Guide.
The following items are required:
Lyve Mobile Array(s) | Lyve Token files unlock specific Lyve Mobile Arrays in your subscription. At least one Lyve Mobile Array must have been added to your subscription. |
Permissions | The member creating the Lyve Token file must have been granted the Manage Security permission (see Manage subscription members). Members lacking the Manage Security permissions will not see the Security menu in the sidebar. |
Registration file | The product end user (the person who will be using the Lyve Token file to access devices) must provide you with a registration file (.JSON) for their instance of Lyve Client. The registration file is created using the Lyve Client app on the computer that will be accessing devices. For an overview of the process as well as instructions on creating a registration file, see Accessing Devices with a Lyve Token Software Unlocker in the Lyve Mobile Security User Guide. |
To register the Lyve Client instance:
Alternatively, select the More icon in the 'Actions' column, and then select View Subscription.
Wait a moment while Lyve Management Portal processes the file. The new unlocker appears in the list of software unlockers.
To create the token file:
Enabled | The Lyve Token file can be imported and stored in Lyve Client, allowing the host computer to unlock assigned devices whenever they’re connected. |
Disabled | The Lyve Token file may only be used to unlock assigned drives for the current session. The file is not deleted from its location on the host computer, but it must be reselected each time the end user wants to use it. |
Lyve Management Portal creates the token file and downloads it to the location where you receive downloads.
Once the token file has been created, send it to the product end user with the computer that will unlock the connected Lyve Mobile Arrays assigned to it.
The end user will then import the token file and/or unlock Lyve Mobile Arrays with it. See End user final tasks in the Lyve Mobile Security User Guide.
You can edit a software unlocker in order to rename it.
To remove a software unlocker:
The following items are required:
Lyve Mobile Array(s) | Lyve Token files unlock specific Lyve Mobile Arrays in your subscription. At least one Lyve Mobile Array must have been added to your subscription. |
Unlocking device(s) | A hardware unlocker authorizes unlocking devices (such as a Lyve Mobile Padlock or Lyve Mobile Link) to unlock specific Lyve Mobile Arrays in the subscription. At least one unlocking device must have been added to your subscription. |
Permissions | The member creating the Lyve Token file must have been granted the Manage Security permission (see Manage subscription members). Members lacking the Manage Security permissions will not see the Security menu in the sidebar. |
To create the token file:
Lyve Management Portal creates the token file and downloads it to the location where you receive downloads.
Once the token file has been created, send it to the product end user with the unlocking device (Lyve Mobile Padlock or Lyve Mobile Link) that will unlock connected Lyve Mobile Arrays assigned to it.
The end user will then make the token file available to the unlocking device. See End user tasks in the Lyve Mobile Security User Guide.