2.1 Logging on to MyID for the first time

Towards the end of the installation process, the person installing MyID is prompted to specify a passphrase for a user account that enables access to MyID.

The startup account is intended to give you enough time to configure the basic system and to arrange a permanent logon mechanism. It is good practice to create named accounts with appropriate roles as soon as possible and use those accounts to manage MyID. A number of options are available and your organization will have chosen the method most suited to its needs. See section 3, Logon mechanisms, for brief explanations of the different methods and instructions for implementing them.

The Installation and Configuration Guide contains information on using GenMaster to set the passphrase for the startup user.

2.1.1 Connecting a workstation

See the Installation and Configuration Guide for details of installing and configuring MyID Desktop on your workstations.

2.1.2 Logging on to MyID

Your administrator may have enabled more than one method of accessing MyID. For example, your usual logon method may be to use your smart card, but your administrator may allow you to log on using security questions in case you have lost or forgotten your smart card. For more information, see section 3, Logon mechanisms.

Welcome screen

Click the tab for the logon method you want to use, then follow the on-screen instructions.

2.1.3 Default security settings

When you install MyID, the settings on the Device Security page of the Security Settings workflow are configured to require you to use customer GlobalPlatform keys and random Security Officer PINs (SOPINs). The system is also configured to display warnings if your system is not securely configured:

The message is:

The system is not configured for production use – check the MyID system security checklist document for further information.

If this warning appears, you must review the settings on the Device Security tab on the Security Settings workflow; see the System Security Checklist document. This document also contains information about configuring SOPINs, GlobalPlatform keys, and PIV9B keys to ensure that your system is secure and configured for production use.