Using WebAuthn
  • 02 May 2023
  • 1 Minute to read
  • Dark

Using WebAuthn

  • Dark

Article summary

How to Add a Device for WebAuthn

When the administrator notifies certain groups that they will now be using the WebAuthn authentication method, it is up to the user to register a device.

Devices cannot successfully set up this feature in Incognito browsers. The browser must have access to the device's security settings.

This authentication method will require setting up an External Security Key or a Windows, MacOS, iOS or Android Device authentication including methods such as Device PIN, Touch ID, Face ID, or Biometric devices.

  1. In the Self-Service center, choose Manage WebAuthn.
  2. There will not be any existing the first time you manage the WebAuthn capability. Click Add Device.
  3. This is where you define the type of WebAuthn you want as your customer experience.
  4. To use USB, Bluetooth, or NFC security keys for login from multiple computers or mobile devices, choose External Security Key. If you are moving from one computer to another throughout the day and have a physical item that you keep with you, those can be registered here.
    1. Give the device a name and click Continue. A system window will pop up to tell you that your security key is now being set up - click OK.
    2. Insert your security key into the USB port of the computer being used.
  5. Once the security key has been read and confirmed, it is now registered to this device. Have this key available any time you log into RapidIdentity for authentication.

  1. If you only log into the system on one device, such as a laptop that goes everywhere with you or a computer at an assigned seat, you will want to choose This Device. Any authentications you may have already had on your device will now apply for RapidIdentity login under this policy.
    1. Give the device a name and change the Device Type to This Device.
    2. Click Add Device, and your credentials will be confirmed via the settings in Windows, MacOS, iOs or Android.
  2. Users can now authenticate with the chosen method the next time they log in.

Was this article helpful?