This document outlines common operating system verification prompts end users may encounter and provides context for why they appear.
What are verification prompts?
Verification prompts are security measures employed by operating systems to confirm user identity. They appear as pop-up windows requesting input, such as a password, fingerprint scan, or facial recognition.
Authentication Rule Outcomes
Beyond Identity Administrators can choose from one of two methods that require end user interaction when authenticating with Beyond Identity.
Allow with Any Factor - The user can choose how to verify their identity on the local operating system. Common options Include a pin, a password, a finger print , or facial recognition.
Example in policy:
Example on Operating System:
Allow with Any Biometric - The user must verify their identity on the local operating system using a biometric method. Common options Include a finger print or facial recognition.
Example in Policy:
Example on Operating System:
Comments
0 comments
Please sign in to leave a comment.