Authentication remote control with biometric checking

The RemAuth Control app is the authentication remote control for end users of RemAuth based services.

It is the most simple and secure way to authenticate with the infrastructure.

  • Passwordless
  • Biometric checking
  • End user comprehensive dashboard
  • Optional certification

Installing RemAuth Control on smartphone and computer

Latest version: 4.0.3. See release notes.

Getting Started in a snap

Launch the application...

On first launch, you must enter an email address that you will use as one of your identifiers for the application.

In a second time, you will be able to link other addresses to your installation.

... and associate an email address

Each email address associated with the application must be confirmed by clicking a confirmation link sent to that address.

With information about your device and the visual codes attached to the operation, you can be assured of the origin of the message.

From the authentication perspective, the application thus acquires the same reliability as the email inbox where the confirmation link was clicked.

Example of a message to link an email address to RemAuth Control
Example of configuration email

Authenticating to a service

Authentication from a login form

This is the most general case of a service that uses the RemAuth authentication. Depending on the service, an authentication message can be sent in parallel to your email address, your mobile phone and to all the devices where the RemAuth Control app is enabled with one or more of your accounts.

Unlike traditional email or SMS messaging systems, the RemAuth Control application is notified in real-time of authentication requests.

Simple authentication

Example of standard authentication

On reception of a request, a progress bar displays the remaining time before time-out.

In case of time-out, you will have to renew the request.

Authentication with biometric checking

example of biometric checking

If your smartphone supports it (i) and is well configured (ii), biometric checking may be required to confirm your identity.

  1. Biometrics works on iPhones 5S+ and Android 6+ equipped with sensor. When a biometric check is required but your device does not support it, a warning is displayed.
  2. Please see the RemAuth Control ABOUT section to know if your device is compatible with the RemAuth Control biometric checking.

Authentication with RemAuth Card certificate

example of authentication with certification

An additional security level can be required by the service provider through certification with a physical second factor.

For further details, see the CERTIFY section.

Authentication by QR-code

Example of QR-code based authentication

RemAuth also allows service providers to login using QR-codes. For security reasons, the QR-codes have a lifetime of about a minute.

You just have to scan one of those codes by pressing the AUTHENTICATION SCANNER button. Then, if you have several email identifiers associated to your application, select one of them.

The service behind the QR-code is notified in real time, all you have to do is to login.

Regardless of the method used, security and privacy are ensured throughout the authentication chain, from the service provider to your application.

Keeping your identity under control

Use as many identifiers as you need

Example of accounts

The same way you have associated a first email address on initial application launch, you can add other email identifiers. You just have to open the ACCOUNTS section and press the button.

You can pair a cell phone number to each email identifier in order to be able to authenticate by SMS. You just have to press the button of the required identifier to start the pairing process.

At any time you can unpair a phone number by pressing the button.

Log in to as many services as you want

Example of services

With the SERVICES section, you can view the list of all the subscribed services where one or more of your email identifiers are used to authenticate with RemAuth.

At any time, you can disable or re-enable the use of one of your identifiers for a given service.

Display your authentication log

Example of log

The Log section displays the list of all the authentication attempts and their results with all your identifiers, all your services and all the available authentication methods.

For each entry, the result of the attempt is summarized by an icon:

  •   The authentication did not succeed before time out.
  •   The authentication has been rejected by the application.
  •   The authentication has been accepted by the application.
  •   The authentication by QR-code has been completed.
  •   The authentication has succeeded by email.
  •   The authentication has succeeded by SMS.

  When the biometric checking has been used, the user email address is preceded by a small icon .

  When the certification has been used, the name of the service is preceded by a small icon .

Manage your installations of RemAuth Control

Example of device description

You can use the RemAuth Control app in parallel on several smartphones and computers.

In case of theft or loss of one or your devices, you can remotely dissociate its RemAuth installation in order to prevent its misuse. This function does not apply to your smartphone in use.

 Each device description is preceded by a visual which symbolizes its biometric capabilities.

Reset the app and check your certificates



On reset, all the identifiers are cleared and the app is set back to its initial configuration.

Scan of RemAuth Card certificates

 You can scan your own certificates to check the data attached to them, such as activation and expire dates.