EasyManua.ls Logo

2N Access Unit - 2 N Access Unit Configuration Manual; ;

2N Access Unit
134 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
2N Access Unit Configuration Manual
92 / 134
The primary key can be re-generated any time. Thus, the original primary key becomes the first
secondary key, the first secondary key becomes the second secondary key and so on. Secondary
keys can be deleted any time.
When a key is deleted, the 2N
®
Mobile Keyusers that still use this key will not be able to
authenticate themselves unless they have updated the encryption keys in their mobile devices
before deletion. The mobile device keys are updated at every use of the 2N
®
Mobile
Keyapplication.
List of Parameters
Location ID– set a unique identifier for the location in which the selected encryption key
set is valid.
Export– push the button to export the location ID and current encryption keys into a file.
Subsequently, the exported file can be imported to another device. Devices with identical
location IDs and encryption keys form a so-called location.
Import– push the button to import the location ID and current encryption keys from a file
exported from another 2NAccess Unit.Devices with identical location IDs and encryption
keys form a so-called location.
Restore primary key– by generating a new primary encryption key you delete the oldest
secondary key. Thus, the2N
®
Mobile Keyusers that still use this key will not be able to
authenticate themselves unless they have updated the encryption keys in their mobile
The encryption keys are generated automatically upon the 2NAccess Unitfirst
launch and saved into the 2NAccess Unitconfiguration file. We recommend you
to re-generate the encryption keys manually before the first use to enhance
security.

Table of Contents

Other manuals for 2N Access Unit

Related product manuals