The shortest path to have a FIDO2 security key
IDmelon app enables users to use their smartphones as a security key. Once the IDmelon app is installed and activated on a user’s smartphone, the user can use the smartphone as a roaming USB FIDO2 security key on a PC.
Our technology is the fastest and easiest way to have a secure FIDO2 authenticator. We take advantage of expensive and advanced technologies of smartphones such as biometric sensor and secure element in our solution.
Your smartphone with IDmelon can be used for login to a Windows 10 machine (Azure AD joined) or to the Web via the browser on a PC; similar functionality of ordinary hardware security keys, such as Yubikey, Trustkey or Solokey but with more benefits.
IDmelon authenticator app is a FIDO2 certified authenticator and also shortlisted by Microsoft as a trusted key for passwordless experience with Azure Active Directory and Microsoft 365.
HOW TO START ?
To start using your smartphone as a security key, you need to either pair your smartphone with your PC or have an IDmelon Reader. Each method of use has unique benefits and can be chosen depending on user types and workplace policies.
To pair a smartphone with a PC, you need the IDmleon Pairing Tool application installed on the computer.
IDmelon reader is a plug and play hardware, which allows users to have a tap-n-login experience with their smartphones. Workspaces with shared computers are great places to use the IDmelon Reader.
SECURITY KEY TYPES SUPPORTED
Our solution supports different types of security keys. System admins can select the right one in their workspace panels and assign it to users’ smartphones according to the working environment policies.
The security key types can be defined based on the following parameters:
It can be done by biometric authentication of the user on the smartphone, or by PIN on the computer like ordinary hardware security keys.
Secret Key Storage:
There are two options for generating and storing the credentials’ secret key on either smartphone secure elements or Cloud HSM services.
Advantage of Using Smartphone as a Security Key
The advantages of using a smartphone as a key can be reviewed from two perspectives.