1. Introduction
  2. HIN Access Gateway
    1. Overview
    2. AGW registration
    3. Access to an HIN-protected site
    4. The link between an AD login and an HIN identity
    5. Trust level concept
    6. Second factor for trust level 3 applications
    7. Identity reference/packages
    8. System administration
  3. Commissioning
    1. Overview
    2. Verifying the AGW image checksum
    3. Preparation for commissioning
      1. Creating an A record / Requesting a certificate
      2. Activating ports
      3. Settings for video identification
    4. Integration into the company network
      1. Importing the OVA appliance on VMWare
      2. Creating the VM on Microsoft Hyper-V
    5. Activation of the HIN access gateway
  4. Configuration of the HIN access gateway
    1. Overview
    2. Status
    3. System configuration
      1. Network configuration
      2. Active Directory Access
      3. Group Mapping
      4. Upstream Proxy
      5. Time
      6. Monitoring
      7. Notification service
      8. Advanced Network Config
    4. SSL
    5. AGW Registration
    6. Administration
      1. Online backup
      2. Software updates
      3. Support Connection
      4. Buttons
    7. Clusters
      1. Activating clusters
      2. Adding nodes
      3. Removing nodes
    8. Logs
    9. Users
  5. Connecting to the active directory
    1. Kerberos
  6. Browser configuration
    1. Internet Explorer
    2. Firefox
  7. Testing
    1. Access to HIN-protected sites
    2. Internet access
    3. Internet access
  8. Frequently asked questions