Authenticating Workstations

When you log into Enact for the first time using a specific browser/device combination (for example, Microsoft Edge on your laptop or Chrome on your tablet), Enact must confirm the workstation is authenticated. Using local authentication, you can authenticate the workstation yourself, typing the authentication code sent to your email and then selecting your workstation name from a list. Using remote authentication, you can submit a request for authentication to an authorized user with access to the given workstation, who can then approve the authentication through email.

During workstation authentication, authenticating users will only see workstations assigned to departments that those users can access. If a workstation isn't assigned to a department, any user can authenticate that workstation.

Consider the following scenarios:

  • If you have an assigned license and your role has remote authentication permissions and you have an email on file, you will authenticate your own workstations.

  • If you have an assigned license and your role does not have remote authentication permissions, an administrator within the same Access Level Processes will receive your authentication emails.

  • If you have an assigned license and your role has remote authentication permissions but you do not have an email on file, an administrator within the same Access Level Processes will receive your authentication emails.

For more information, please see the following: