Authenticating Workstations

Authenticating a workstation is a security measure. It tags the workstation as trusted. Any workstation not authenticated cannot be used to access Enact, even if the user attempting the access has a valid user name and password. This prevents stolen user names and passwords from being used without a further check.

Authenticating a workstation is different than licensing a workstation. All workstations must be authenticated, whether they are licensed or unlicensed. Authentication is a one-time event.

There are two methods for authenticating a workstation: local and remote.

Local authentication can be done by users who have a registered email address in their Enact profile and have been granted the Local Workstation Authentication permission. The procedure is:

  1. On the workstation, using a browser, navigate to your Enact log in page.

  2. Enter your Company ID, Username, and Password and click Login. Because Enact detects the workstation as unauthenticated, this initiates an email to your email address and displays an Authenticate Workstation prompt

  3. When the email arrives, copy enter the 4-digitAccess Code included in it into the prompt's Access Code field.

  4. In the prompt, expand the Workstation list and select the name of the workstation you are authenticating.

  5. Click the prompt's Authenticate button.

Remote authentication is an alternative procedure for users who don't have a registered email address in their profile. Some Enact customers, in case it isn't known, do not set up email addresses for certain types of workers, such as temporary workers. Such users would use the remote authentication procedure if they need to use a workstation that has not been authenticated. This procedure involves the user who doesn't have an email address and a user with the Remote. Workstation Authentication permission who has an email address. This procedure refers to the user who doesn't have an email address as the requesting user and the user who does as the approving user.

  1. On the workstation, the requesting user, using a browser, navigates to the Enact log in page.

  2. The requesting user enters his or her Company ID, Username, and Password and clicks Login. Because Enact detects the workstation as unauthenticated, this initiates an email to all approving users (all users with an email address and the Remote Workstation Authentication permission) and displays an Authenticate Workstation prompt on the unauthenticated workstation.

  3. Any approving user who wishes to do so opens the email and clicks Approve, which remotely authenticates the workstation.

  4. The requesting user logs in on the newly authenticated workstation.