GateKeeper token (factor 1) with a PIN (factor 2) is the most secure method of logging in with GateKeeper.
First, make your Windows/mac password extremely long - 50 characters should do.
GateKeeper proximity authentication utilizes a user's token's distance from a Bluetooth sensor to determine presence. The GateKeeper token (Halberd of Trident phone app) will be the first factor (possession) and your PIN will be the second factor (knowledge). With any GateKeeper unlock option, you can login password-free.
In order to log in to your computer and websites with proximity authentication, please follow these steps:
1. Open your GateKeeper Client application on your PC by pressing the Windows key on your keyboard and start typing "GateKeeper".
2. Click Settings in the lower left.
3. Under Unlock Settings, go to Unlock Method, and select GateKeeper with PIN Login in the dropdown menu to enable two-factor authentication (2FA).
Automatic Login: |
Proximity login - once the user is in the range of the computer, the user will be authenticated. |
Press Enter Key to Login: |
When the token is in range of the computer, pressing the Enter key will authenticate the user. |
Touch Login: |
Touch the token to the USB sensor to authenticate – just like an NFC card. |
GateKeeper with PIN Login: |
2FA method: Requires the presence of a GateKeeper token and typing of a secret PIN to authenticate. |
Welcome to authentication without typing passwords - efficient workflow for all employees.
If you have any other questions regarding how to login and logout of your PC using proximity authentication, please read more at www.gkaccess.com or contact us at info@gkaccess.com.
--------------------------
Logging into PCs with proximity; presence detection login; logging in to computers with key fobs; passwordless PC login; wireless authentication; login to computer with proximity; PC login with proximity keyfob; key fob for computer login; wireless computer log in; remote control for computer; PC remote controller; PC key fob; touch unlock; touchless unlock; unlock by touching; unlock by touch; login remote workers; remote workstation log in; remote workers computers; can remote users login to PC?; log in with proximity; detect presence to login; login with presence detection technology; advanced presence detection; advanced proximity detection log in; log in with proximity software; software for logging in with proximity; software for logging in with presence detection tech; tech for prox login; prox log in; proximity presence login method; login by walking up to computer; unlock PC by walking up to it; unlock computer by approaching; unlock with approach; PC open sesame with presence; be there to login; login with a key fob; log in with a token keyfob; Bluetooth-based Smart Lock for Computer; Bluetooth-based Smart Lock for PC; Bluetooth-based Smart Lock for Windows; Bluetooth-based Smart Lock for Mac; Bluetooth-based Smart Lock for workstation; computer remote lock; secure remote workers; securing remote workers; secure remote employees; securing remote employees; how to secure remote employees; how to secure remote workers; how to secure remote computers; how to secure remote PCs; how to secure a remote PC; how to secure a remote workstation; how to secure a workstation at employee's home; how to secure offsite computer; securing offsite computers; securing offsite workstations; securing offsite PCs; remote work securely; securely remote work; at home password manager; carry passwords securely; use passwords from anywhere securely; factor 1; factor 2; proximity login; proximity 2FA login; computer login with 2FA proximity; proximity-based login to PCs; PC login with proximity 2FA; MFA proximity system; proximity-based MFA; secure proximity access control; secure proximity login; proximity Windows login; secure token unlock; enabling token-based authentication; two-factor authentication methods; GateKeeper security; gatekeeper recommendations for security protocols; securest login method; strongest login method; strongest security; highest security; high-level security settings; 2FA lock;
Comments
0 comments
Please sign in to leave a comment.