Preview

Running Rsa as Service

Good Essays
Open Document
Open Document
323 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Running Rsa as Service
Installing RSA as a service.
After configuring the RSA polling settings. Please perform the followinf steps for running RSA as a service on the local server.

1. Locate the Remote Synchronization Agent (RSA) executable acirsa.exe present in the installation path of Kofax bin folder.
2. Execute the following command on command prompt.

"" - install

e.g “C:\Program Files\Kofax\Capture\Bin\fp.exe” -install

Note that the quotation marks around the path and executable name are required, as shown in the command line syntax.
Note You must be logged in to Windows with administrative rights to install services. Notification of Successful Service Installation
After you run the installation command for services, a message displays to confirm a successful installation.
Once the successful installation message displays, the Kofax Capture service is installed. In addition, the module will be listed in the list of Services displayed from the Windows Services utility.

To launch the Services utility
1 From the Windows Control Panel, select Administrative Tools | Services.
2 When the Services utility starts, look for the name of the Kofax Capture module that you installed as a service

Configure Kofax Capture Services
After installing a Kofax Capture service, you use the Windows Services utility to configure a startup type and a logon account type.
Note By default, the startup type selection is “Manual.” To configure a Kofax
Capture service to start automatically at system boot, you need to change the startup type to “Automatic.”

For the logon account, you must specify a Windows user account that is valid for the workstation where you intend to run the Kofax Capture service. By default, all Kofax
Capture services use the LocalSystem account as the default user. It is recommended that you change this to be a standard user account. If you are accessing resources in a network environment, be sure to specify a valid network account. You

You May Also Find These Documents Helpful

  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    iv. Users or workforce members must not allow another user or workforce member to use their unique user identification or password.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    e. A user tries to log in, provides a user name, and gets denied. What settings would cause this and how?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    It gives the person access using the sudo access, superuser capability and allows them to run programs with the…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 Exercise 1

    • 225 Words
    • 1 Page

    b. Under Deployment Tab – Change whether you want the application to uninstall off computers when you remove the GPO…

    • 225 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    A local user is stored in the __Security Account Manager (SAM)__ database of the computer on which it was created. P102…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ittnt2670 Lesson 1

    • 489 Words
    • 2 Pages

    To create a searchable catalog of Web services on your network, you would install the __________ role.…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The type of access controls and permissions that are probably configured are Modify , Read or Full control.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1. Currently, system administrators create Ken 7 users in each computer where users need access. In the Active Directory, where will system administrators create Ken 7 users? Open Active Directory Users and Computers. In the console tree, right-click the folder in which you want to add a user account. Point to New, and then click User. In First name, type the user's first name. In Initials, type the user's initials. In Last name, type the user's last name. Modify Full name to add initials or reverse order of first and last names.…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The Windows 7 AIK script files used to perform unattended installations are called task sequences.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It is the internal policies and procedures for any setting and it’s very important to have access to these policies.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays

Related Topics