eviden-logo

Evidian > Products > Authentication Manager: Multi-factor strong authentication (MFA) for PCs and Servers > Evidian QRentry - A self-service password reset tool with a smartphone and a QR code

A self-service password reset tool with a smartphone and a QR code

Evidian QRentry

Demonstration of a self-service password reset tool with a smartphone and a QR code

The video shows a user Tom.

  • Tom has forgotten his password, can't find his smart card and can't remember the name of his mother-in-law's dog
  • A QR code is displayed on his PC
  • Tom starts the QRentry app on his smartphone and scans the QR code
  • A passcode is displayed on his smartphone
  • Tom enters the passcode on his PC and he is login

The solution is working even if Tom is flying in an airplane with no Wi-Fi and mobile network.

This SSPR solution (Self-Service Password Reset) is a combination of Evidian Authentication Manager on the PC and Evidian QRentry on the smartphone.

More on the self-service password reset tool implemented by Evidian QRentry

Turn your smartphones into a means of strong authentication

Evidian QRentry is a self-service password reset tool which can be downloaded on a smartphone from Google Play and the Apple Store. When users lose a password or a smartcard, they can unlock themselves their PC via QR Codes (secure One-Time Passwords (OTP)).

Use a secure emergency access wherever you are

Combined with Evidian Authentication Manager, QRentry is the ideal partner of strong authentication deployments, which often generate "lost smartcard" or "biometrics doesn't work" helpdesk calls. With this self-service password reset tool, users can unlock themselves their PC, even if helpdesk is out of reach.

Optimize your help desk activity

Because the password reset tool is in self-service, the amount of help desk calls decreases dramatically.

Evidian SSPR solutions

Smartphone with QR Code

Users reset their passwords with their smartphones and a QR Code. This solution does not require a network connection for the workstation, nor a mobile network for the smartphone.

Answering to security questions

Users reset their passwords by answering to security questions. This solution does not require a network connection.

Password reset portal

Users reset their passwords from a password reset portal. This solution requires an Internet or Intranet access.

Evidian passwordless strong authentication methods

Evidian Authentication Manager replaces passwords by strong authentication methods.

Cover all authentication scenarios, whether a user accesses one or several PCs, or several users share one PC.

Examples of single sign-on solutions with Evidian Enterprise SSO and Authentication Manager

Typical use of SSO by over 5 million employees

Employees use a passwordless strong authentication method. After that, application passwords are automatically entered, on behalf of the employee, during application login prompts. This works either with web based, desktop as well as legacy applications without modifying them. Evidian gives an access to the applications to which the employee is entitled. And it transparently modifies and manages strong passwords for each application. An access log is centralized to facilitate audits, to know which employee uses which application and to meet regulatory constraints.

One PC - used by several users

Branch employees, sales staff in outlets, workers in manufacturing industry and others share a same PC in their Enterprise. They use a shared account with autologon to access the Windows session without password to save time. However, knowing who authenticated to the PC and at what time cannot be audited. Evidian with its multi-user desktop solves this problem with a fast user switching in a few seconds and a strong authentication method like a RFID badge to unlock the shared session.

One user – using multiple PCs successively

The day-to-day tasks of some employees may require them to move around within a site, such as doctors in a hospital, production managers at an industrial site, store vendors, and others. On each PC, they must log in to access their session and log out. As it takes time, an alternative solution must be found. Evidian offers a simple solution with a roaming session avoiding multiple login.

One user – using multiple PCs at once

Some employees need multiple PCs and monitors in order to work. These may include trading room workers, control room operators in industry, in transport, in video surveillance and others. It is unrealistic to ask these employees a multiple login to all PCs. Evidian offers a solution with a single login to multiple computers at once.

Are you looking for another solution?

Evidian offers many other solutions that will certainly meet your needs. Do not hesitate to contact us.

Passwordless, contactless, handsfree authentication

Evidian SSO Single Sign-On

Evidian Enterprise SSO provides single sign-on to all users, businesses and organizations.

Free your users from remembering and typing passwords and drive your security policy by automating password management.

More than 5 million employees use Evidian authentication products

Most popular authentication

Description
  1. Password
Simple, even rustic, its biggest flaw is that the security level depends directly on the complexity of the password. The result is that too many overly complex passwords make users take various measures to remember passwords, such as writing them down on Post-It™ notes or entering them in an Excel file or a smartphone.

A login and password combination is the most commonly used method of authentication. Single sign-on (SSO) solutions can reduce the increased number of passwords.

  1. One-Time Password OTP)
An OTP can prevent a password from being stolen and reused. An OTP system (usually a specialized calculator) provides a password upon request. This password is valid for a limited period of time and can only be used once.OTP is generally used for initial authentication for external access via VPN. It does not require any configuration of the workstation or smartphone concerned.
  1. PKI certificates on a smart card or USB key
X.509 certificates are often used to encrypt or sign messages without having to share a secret. The login ID is a public certificate that is signed and therefore guaranteed by a recognized certification authority. The user must provide a secret piece of information in order to use the cryptographic elements, such as the PIN code of its smart card or its USB key. In companies, smart cards are typically used more often than USB keys for authentication, even though the chip itself is often the same in both cases.This solution is frequently used for initial authentication or for access to email or web applications. It requires a Public Key Infrastructure (PKI).
  1. Login and password on a smart card or USB key
Storing the login and password on a smart card completely secures the authentication process. The password can be very complex, and it can be automatically and randomly changed very frequently. Without the card and its PIN code, there is no longer access to the password.This solution is usually used for authentication on PCs without having to deploy a key infrastructure.
  1. Cell phone
A cell phone can serve as an authentication object. There are two main methods used:

  • During authentication, a one-time password is sent by SMS to the user's cell phone.
  • A smartphone application calculates a one-time password itself.

The cell phone method is often used if the user forgets his password or smart card, particularly for access on the Internet.

  1. Biometrics
Authentication using biometrics is based on verifying a part of the user's body. The most often type used is the digital fingerprint. The user's biometric data is stored on a central server (with major legal constraints), on the workstation, or on a smart card.Biometrics is typically used for initial authentication or to protect access to highly sensitive applications.
  1. Contactless card
A chip that is embedded into a contactless card contains a code that identifies a user. Therefore this is an identification method that, paired with a password, can be used in authentication procedures. There are two versions of this technology. With active RFID, the card has its own power unit. This enables detection over a longer range (e.g. when entering a room or office).Active RFID can be used to detect absence for workstations in areas accessible to the general public.With passive RFID (HID, MIFARE, etc.), the card does not have its own power unit. When it is read, it is powered by an electromagnetic field generated by the reader.Passive RFID is often used to control physical access using a pass or for payment in a company cafeteria. This type of card can be detected from a few centimeters away

Evidian Products - Protect your company from cyber attacks by unauthorized users

Orbion

Evidian takes care of everything related to your Identity and Access Management with Orbion (Identity as a Service)

Learn more   >

Identity Governance and Administration

Manage access and authorization of all your users in your company

Learn more   >

Web Access Manager

Gateway for web apps with SSO, multi-factor authentication, identity federation

Learn more   >

Analytics

Monitoring and powerful reporting for regulatory compliance

Learn more   >

Authentication Manager

Authentication Manager

Enterprise multi-factor & passwordless authentication on Windows PCs

Learn more   >

Enterprise Single Sign-On (SSO)

Secure access to legacy and web apps on PCs & mobiles with SSO

Learn more   >

Self Service Password Reset (SSPR)

Reset Windows passwords online and offline

Learn more   >

SafeKit

High availability software for critical applications

Learn more   >

Evidian IAM leader in the French and German markets and in U.S. Public Sector

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in France

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in Germany

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in U.S. Public Sector

What are IAM cyber security tools and solutions?