You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

Description

Indeed AM Windows® Logon features

The Indeed AM Windows® Logon product provides the users with following capabilities:

  • Logging in to the system with account password
  • Logging in to the system with Indeed AM authentication technology
  • Access to remote desktop with Indeed AM authentication technology
  • Logging in to the system with cached authenticator when connection to Indeed server cannot be established.

To provide for user data security when user is not at his/her workplace, the Indeed AM Windows® Logon supports both manual locking of workstation, and automatic one. The latter is triggered when authentication device is removed or when screen saver becomes active. To unlock the workstation, it is always necessary to confirm user identity again with authenticator, regardless of the locking method.

Advanced features

The Indeed AM Windows® Logon provides for the following advanced features:

  • Registration of authenticator by user and authenticator management using the Indeed AM – Authenticator management application.
  • Indeed AM Paste function, that pastes the user password in hidden form into required field upon pressing the set hotkey combination.

Supported authentication technologies

The Indeed AM Windows® Logon product supports more than 20 modern authentication technologies. These are: two-factor authentication, biometric authentication, certificates, proximity cards, one-time passwords, SMS technologies etc.
You can define the most suitable authentication technology for each category of Indeed AM Windows® Logon users. The users can also be allowed to use several technologies:

  • authentication technology, adapted for remote use;
  • combination of authentication technologies (multi-factor authentication).

Operation of Indeed AM Windows® Logon

This section contains description of the main Indeed AM Windows® Logon operation scenarios:

  • The first authenticator registration
  • Access to system using an authenticator
  • User authenticator caching
  • Password changing by user


  • No labels