Authentication remote control with biometric checking
The RemAuth Control app is the authentication remote control for end users of RemAuth based services.
It is the most simple and secure way to authenticate with the RemAuth infrastructure.
- Biometric checking
- End user comprehensive dashboard
- Optional certification
Installing RemAuth Control on smartphone and computer
Latest version: 4.1.x. See release notes.
Getting Started in a snap
Launch the application...
On first launch, you must enter an email address that you will use as one of your identifiers for the application.
In a second time, you will be able to link other addresses to your installation.
... and associate an email address
Each email address associated with the application must be confirmed by clicking a confirmation link sent to that address.
With information about your device and the visual codes attached to the operation, you can be assured of the origin of the message.
From the authentication perspective, the application thus acquires the same reliability as the email inbox where the confirmation link was clicked.
Authenticating to a service
Authentication from a login form
This is the most general case of a service that uses the RemAuth authentication. Depending on the service, an authentication message can be sent in parallel to your email address, your mobile phone and to all the devices where the RemAuth Control app is enabled with one or more of your accounts.
Unlike traditional email or SMS messaging systems, the RemAuth Control application is notified in real-time of authentication requests.
On reception of a request, a progress bar displays the remaining time before time-out.
In case of time-out, you will have to renew the request.
If your smartphone supports it (i) and is well configured (iii), biometric checking may be required to confirm your identity.
- Biometrics works on Android smartphones (version 6 and more) equipped with sensor, as well as iPhone 5S and more.
- Generally biometric checking is based on fingerprint recognition, except for iPhone X which uses face recognition (Face ID™).
- Please see the RemAuth Control ABOUT section to know if your device is compatible with the RemAuth Control biometric checking.
Authentication with RemAuth Card certificate
An additional security level can be required by the service provider through certification with a physical second factor.
For further details, see the CERTIFY section.
Authentication from dynamic QR-code
RemAuth also allows service providers to login using QR-codes. For security reasons, the QR-codes have a lifetime of about a minute.
You just have to scan one of those codes by pressing the AUTHENTICATION SCANNER button. Then, if you have several email identifiers associated to your application, select one of them.
The service behind the QR-code is notified in real time, all you have to do is to login.
Regardless of the method used, security and privacy are ensured throughout the authentication chain, from the service provider to your application.
Stay in control of your identity
Use as many identifiers as you need
The same way you have associated a first email address on initial application launch, you can add other email identifiers. You just have to open the ACCOUNTS section and press the button.
You can pair a cell phone number to each email identifier in order to be able to authenticate by SMS. You just have to press the button of the required identifier to start the pairing process.
At any time you can unpair a phone number by pressing the button.
Log in to as many services as you want
With the SERVICES section, you can view the list of all the subscribed services where one or more of your email identifiers are used to authenticate with RemAuth.
At any time, you can disable or re-enable the use of one of your identifiers for a given service.
Display your authentication log
The Log section displays the list of all the authentication attempts and their results with all your identifiers, all your services and all the available authentication methods.
For each entry, the result of the attempt is summarized by an icon:
- The authentication did not succeed before time out.
- The authentication has been rejected by the application.
- The authentication has been accepted by the application.
- The authentication by QR-code has been completed.
- The authentication has succeeded by email.
- The authentication has succeeded by SMS.
When the biometric checking has been used, the user email address is preceded by a small icon .
When the certification has been used, the name of the service is preceded by a small icon .
Manage your installations of RemAuth Control
You can use the RemAuth Control app in parallel on several smartphones and computers.
In case of theft or loss of one or your devices, you can remotely dissociate its RemAuth installation in order to prevent its misuse. This function does not apply to your smartphone in use.
Each device description is preceded by a visual which symbolizes its biometric capabilities.
Reset the app and check your certificates
On reset, all the identifiers are cleared and the app is set back to its initial configuration.
Scan of RemAuth Card certificates
You can scan your own certificates to check the data attached to them, such as activation and expire dates.