Installation Token

Token-limited installation protects against sending unauthorized copies of exported packages and installation of packages on computers which do not belong to the organization that created the packages.

Note - Installation token is not supported on macOS and Linux endpoints.

The administrator is responsible for enabling the token-limited installation feature and creating the token.

If token-limited installation is enabled, then you must enter the token during the registration of the Endpoint Security server with the Harmony Endpoint Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..

The token is limited in time. If the token is expired, the registration is rejected.

To enable token-limited registration:

  1. Go to Endpoint Settings > Authentication Settings > Installation Token.

  2. Select Enable installation token checkbox.

  3. Click to generate a token.

    The token appears in the Value field.

  4. To set an expiration date, select Enable Expiration and in the Valid until field, click to select the date for the token expiry.

  5. Click Save.

To copy the token, click .