Other vendors' hardware keys
IPI Enterprise Server allows using different FIDO Security Keys
Last updated
IPI Enterprise Server allows using different FIDO Security Keys
Last updated
In addition to IPI Keys, you can also use other vendors' keys that support FIDO protocols, (), to authenticate on the IPI Enterprises Server. Such keys include, for example, .
There is a wide selection of third-party hardware security keys that can be used for authentication on the IES. These keys can use USB, Bluetooth, NFS, or even connectionof for authentication. Some of them support Biometric options of authentication.
The main requirement for such keys is their ability to support standards developed by the FIDO Alliance.
Before using keys produced by any other manufacturer, we highly recommend ensuring that they support FIDO U2F and FIDO2 protocols.
Please note that you may use hardware security keys by other vendors only to authenticate on the IES server.
To or the workstation by Proximity or , you can only use IPI Keys.
You can use hardware security keys by third-party vendors to authenticate on the IES using the following methods:
All of these options are available for Admin and User accounts.
The procedure for connecting other vendors' keys to Windows is the same as for .