Device Access

Introduction

Device whitelisting in PureAUTH is the process of allowing only authorized devices to access corporate resources and systems. This is achieved by creating a list of approved devices that are permitted to access the systems, and blocking all other devices. Learn more to know further about Device Access and Zero Trust access.

Admin Prerequisites

To implement Zero Trust Access Control in PureAUTH, there are two requirements:

  • PureAUTH Admin Access: To configure and manage access controls, an administrator must have access to PureAUTH.
  • User Device GUID: To verify the identity of a user device, PureAUTH requires a unique device GUID (Globally Unique Identifier). This is necessary to ensure that only authorized devices can access the network or system. The device GUID is typically OS generated identifier which cannot be changed.

User Prerequisites

To utilize AuthVR5, the following requirements must be met:

  • AuthVR5 Desktop Application: To access the authentication features of AuthVR5, users must have the AuthVR5 Desktop application installed on their corporate device. If you don’t have it yet, visit our AuthVR5 page.
  • Corporate Desktop/Laptop: To use the AuthVR5 Desktop application, users must have a corporate desktop or laptop. This is because AuthVR5 is designed to provide secure access to corporate resources and systems, and it requires a secure and trusted device.

To get the system Machine ID

  • Windows :
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid

This command will query the Windows registry for the "MachineGuid" value under the Cryptography key and display the GUID in the command prompt.

  • Mac :
ioreg -rd1 -c IOPlatformExpertDevice -k IOPlatformUUID Copy IOPlatformUUID

This command uses the “ioreg command to display the I/O Kit registry, which contains information about the system hardware and configuration.

  • Linux :
cat /etc/machine-id

This command will display the contents of the /etc/machine-id file, which contains the machine ID of the system.

Device Whitelisting in PureAUTH 

The following are the steps involved in device whitelisting in PureAUTH:

  • Login to PureAUTH.
  • In the navigation pane, go to Zero Trust Controls > Allowed Device List.
  • Click on Add Device IDs.
  • Enter Name : The name should be the user name that registers against the corporate device.
  • Machine ID : To obtain the device machineID using the commands provided above.
  • Click on Add Machine IDs to submit.
  • You can use the following template to upload a list of machine IDs for bulk entry.
RUQO Device ID

Restrict Applications to the allowed corporate device 

Here are the steps involved in restricting applications to allowed corporate devices.

  • Login to PureAUTH.
  • In the navigation pane, go to Applications.
  • Open the application that you want to restrict.
  • Click on Edit, right up corner.
  • Click on toggle, Enable RUQO.
  • Click on Save Changes.
Edit Application to Enable RUQO

Now the users will be able to access their applications only through the corporate device.

Bind Machine ID to employees

Once the option is enabled from the account settings, this feature will apply to all employees within the organization. When an employee logs in to their corporate device for the first time, they will be automatically bound to that device.

Here are the steps involved to enable bind machine ID to employee.

  • Login to PureAUTH.
  • In the navigation pane, go to Settings.
  • In the Profile click on Edit, right up corner.
  • Enable the toggle, Bind Machine ID to employee.
  • Click on Save Changes.

Was this article helpful to you? Yes No