Introduction
The IDmelon FIDO2 Orchestration Platform helps organizations simply and quickly deploy secure passwordless authentication for their users. Features like Security Key as a Service, FIDO2 managed security keys, and fully automated FIDO2 lifecycle are patented and unique approaches that help organizations enhance their workforce authentication security overnight. No more dealing with purchase and distribution of hardware FIDO2 security keys as organizations can use whatever device their users have as a FIDO2 security key. It can be an Access Card, a Key FOB or a smartphone.
Create a Workspace
1
The IDmelon Security Key as a Service solution can be managed from the IDmelon Admin Panel. You can enroll and activate users' security keys, grant, restrict and monitor their access, manage licenses, and more. If it is your first try, you can create a workspace on behalf of your organization, or you can use your security key to experience a simple passwordless login.
Add Users
2
When the workspace has been created, the first step to take is adding users, which can be done in three ways:
- Add a single user
- Import from a CSV file
- Import from Azure AD
Assign Security Keys
3
While adding users, you can also assign security keys, which can be based on one of the three devices below:
The first option as a device is Smartphone for which an email containing an activation link will be sent to the user’s email address to let user activate their smartphone as a security key.
The second option as a security key device is Contactless Card. This type of device can be activated in two ways:
Activate now: activate a card for your user as an admin if you have the card physically near you.
Activate by user: send an activation email to the user if the card is not with you (the targeted user will receive the registration link via email).
If you already have a security key and you want to use it as a FIDO2 hardware security key, you must select this option. A registration link via email will let you set your hardware as a FIDO2 hardware security key. From then on, your security key can be used for passwordless logins based on FIDO2 standard wherever it is supported.
Security Key Policies
4
The organization can control access of users by setting authentication policies. An admin can create new authentication policies to apply to users’ security keys to limit their access. The limitation can be based on multiple conditions such as time period, IP Address, RP (Relying Parties) that users are trying to reach out, and the location they are trying to login from.