QRentry

3,3
84 ta sharh
10 ming+
Yuklanmalar
Yoshga oid cheklov
3+
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot

Bu ilova haqida

With the advent of mobile devices, our work habits have changed.
Indeed, more and more enterprise applications must be accessed through mobile platforms.
Users want to access their workstations easily without having to remember several different passwords.

To help them access easily their workstation(s) and enterprise applications, Evidian has created an application for mobile devices: QRentry.

QRentry enables you to access your applications with your mobile device. Your applications are launched in an integrated web browser without having to sign-in.

QRentry allows you to use your own mobile device to log on to Windows:

* Nothing to memorize. Just flash the QR Code and QRentry will authenticate you through the network.
* You have several workstations and do not want to enter a password for each of them. QRentry enables you to control your workstations and open their Windows sessions.

QRentry allows you to use your own mobile device to log on to Windows until normal access is restored. In this case, QRentry is an emergency access solution extremely easy to implement and very efficient:

* Nothing to memorize. QRentry will provide you with a one-time code.
* Your workstation is disconnected from the network? Your mobile device does not get a signal? QRentry works anyway.

You can also use QRentry to store personal data: Wi-Fi keys, license number, private passwords... QRentry securely stores them in your own mobile device.

QRentry only works with Evidian Authentication Manager and Evidian SSO Web Portal. Please, don't install or post a comment about this application if you don't have one of these products installed.
For more information about Evidian, visit http://www.evidian.com/iam/qrentry.
Oxirgi yangilanish
2-may, 2024

Maʼlumotlar xavfsizligi

Xavfsizlik — dastur ishlab chiquvchilar maʼlumotlaringizni qanday jamlashi va ulashishini tushinishdan boshlanadi. Maʼlumotlar maxfiyligi va xavfsizlik amaliyotlari ilovadan foydalanish, hudud va yoshga qarab farq qilishi mumkin. Bu axborot dastur ishlab chiquvchi tomonidan taqdim etilgan va keyinchalik yangilanishi mumkin.
Tashqi hamkorlarga hech qanday axborot ulashilmagan
Dastur ishlab chiquvchilar axborot ulashilishini qanday aytishi haqida batafsil
Hech qanday maʼlumot jamlanmagan
Dastur ishlab chiquvchilar axborot jamlanishini qanday aytishi haqida batafsil
Maʼlumotlar uzatish vaqtida shifrlanadi

Reytinglar va sharhlar

3,3
81 ta sharh

Nima yangiliklar

Authentication by notification
Detection of rooted device
Forbid application back-ups