Secure Computing Soft-PK Version 5.1.3 Build 4 Network Router User Manual


 
5
Overview
5-2 Deploying Soft-PK to Your End Users
Overview You should deploy the Soft-PK installation program with a customized
security policy and the necessary digital certificates. Custom
installations are designed to make it easy to manage corporate
security policies for tens, hundreds, or thousands of end users.
Along with the necessary software and files, you should provide
specific Soft-PK installation and setup instructions for each end user.
This facilitates management of corporate security policies for your end
users and simplifies what the end user must do.
The Soft-PK product CD provided by Secure Computing includes a
file (userworksheet.doc) in MS Word format that you can customize
and send to users.
Figure 5-1. Sample
userworksheet.doc file
contained on Soft-PK
product CD
This worksheet contains five main sections that you should edit and
save before distributing to end users. These sections are based on the
information presented in earlier chapters in this manual.
Dial-up network instructions
Soft-PK installation instructions
Certificate instructions
Security policy instructions
Basic connection instructions
Word
format