Installation Token

Token-limited installation protects against sending unauthorized copies of exported packages and installation of packages on computers which do not belong to the organization that created the packages.

Note - Installation token is not supported on macOS and Linux endpoints.

The administrator is responsible for enabling the token-limited installation feature and creating the token.

If token-limited installation is enabled, then you must enter the token during the registration of the Endpoint Security server with the Harmony Endpoint Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..

The token is limited in time. If the token is expired, the registration is rejected.

To enable token-limited registration:

  1. Go Settings > Authentication Settings > Installation Token.

  2. Click Edit.

  3. In the Value field, enter a token.

  4. In the Valid until field, click to select the date for the token expiry.

  5. Click OK.

To copy the token, click .