GridGo is an on-demand, on-screen security grid that is delivered to the user’s logon screen in real time.
This policy provides options that control GridGo Authentication (an on-demand, on-screen security grid that is delivered to the user’s logon screen in real time).
The following system policy settings are for the policy "GridGo default policies", in the category "GridGo";
After editing the policy a new window will open titled "Policy - Edit";
The expandable sections can be broken down as follows;
EXPIRATION
┌─ EXPIRATION ─────────────────────────┐ └──────────────────────────────────────┘
TOKEN ACTIVATION
┌─ TOKEN ACTIVATION ───────────────────┐
└───────────────────────────────────────────────┘
There are three options in the Token Activation policy setting;
- Automatically activate the token when created or assigned
The token is automatically activated and usable as soon as it is created or assigned to the user.
- Send Activation Code to the user when crated or assigned
DualShield will automatically send an Activation Code to the user via the specified Message Channel.
Do Nothing
The token is not activated after it is created or assigned, and not usable until it is activated by the user, and DualShield will not send an Activation Code to the user.
- Automatically activate the token when created or assigned
PATH
┌─ PATH ─────────────────────────────────────────┐ └────────────────────────────────────────────────┘
PIN
A User/Client PIN is a PIN that the user set up on the client to lock the GridGo client software from being accessed by unauthorised people. A User/Client is not a part of the token and is never submitted to the server in the authentication process. A Token/Server PIN is a PIN that the user set up on the server as an extra password to be attached to an OTP (one-time password) generated from his/her GridGo token each time at logon. For instance, if an OTP is 123456 and PIN is 0987 then the password submitted in the authentication process is 1234560987, assuming that the PIN is set to be appended to OTP by the PIN policy. ┌─ PIN ──────────────────────────────────────────┐ └────────────────────────────────────────────────┘





















