Getting Started

The IDmelon Passwordless Platform helps organizations simply and quickly deploy secure passwordless authentication. Features like Security Key as a Service, managed security keys, and automated onboarding help organizations enhance their workforce authentication overnight. No more dealing with purchase and distribution of hardware security keys as organizations can use their existing devices such as Access Cards, Key FOBs or smartphones.

Create a Workspace

1

The IDmelon Security Key as a Service solution can be managed from the IDmelon Admin Panel. You can enroll and activate users' security keys, grant, restrict and monitor their access, and more. If it is your first try, create a workspace on behalf of your organization.

How to create a workspace

Add Users

2

When the workspace has been created, the first step to take is adding users, which can be done in three ways:

  • Add a single user
  • Import from a CSV file
  • Import from Azure AD
How to add users

Assign Security Keys

3

While adding users, you can also assign security keys, which can be based on one of the three devices below:

The first option as a device is Smartphone. An email containing an activation link will be sent for the specified user to activate his smartphone as a security key.

Smartphone as a security key device

The second option as a security key device is Contactless Card. This type of device can be activated in two ways:

  • Activate now: an admin can activate a card for a user if he has physical access to the card.

  • Activate by user: send an activation email containing the registration link to the targeted user.

How to set up a Contactless Card as a security key device

If you already have a security key, select this option to receive a registration link to set your security key as a FIDO2 hardware security key.

How to set up a FIDO2 hardware security key device

Security Key Policies

4

The organization can control access of users by setting authentication policies. An admin can create new authentication policies to apply to users’ security keys to limit their access. The limitation can be based on multiple conditions such as time, IP Address, RP (Relying Parties) that users are trying to reach out, and the location they are trying to login from.

How create a security key policy