Introduction
Overview
This section describes the Control Center view when it is configured for the first time.
Terms
Term | Description |
---|---|
RP | A relying party (RP) is a term used to refer to a server providing access to a secure software application. |
RP App | Claims-Based applications, where a claim is a statement an entity makes about itself in order to establish access, are also called relying party (RP) applications. You can create multiple RP Apps to manage access to different systems within your infrastructure. |
Policy | Authentication Policy to access resources managed by RP App. Configured by Control Center Admin. |
AAID | Unique identifier for the Authenticator. |
Native Authenticator | Default Biometric Authenticator registered on the mobile device. It could be Touch ID or Face ID on iOS Platform, or Fingerprint, Face Authentication on Android Platform. |
PIN Authenticator | 6-Digit PIN specific to your Application. It's a separate Authenticator from device PIN and developed by HYPR. |
Login
Step 1: Open your browser and type in the DNS host name of your server: https://company.login.com
. You should see the Control Center login page.
Step 2: Type in your HYPR Service Account username and password which was configured during installation. This credential is provided during the completion of the installation script.
The default username is hypr and password is listed in /opt/hypr/.install.enc
file.
Step 3: Press Login
Encrypt file to access login credentials
Please decrypt the
.install.enc
file to see the credentials of Control Center.
Dashboard
Below is the screen of the landing page of the Control Center upon a fresh install. The Dashboard contains the following attributes which can be managed by an admin:
There are two RP Apps created by default. Namely, 'HYPR Default Workstation Application' and 'HYPR Default Web Application'.
Please note
'HYPR Default Workstation Application' is used when the decentralized channel is workstation
'HYPR Default Web Application' is used when the decentralized channel is web.
Admins can create more RP Applications or can use the default applications to manage authentication across different resources within the company infrastructure.
Authenticators
Manage what authenticators can be used to authenticate into your application. See Managing Authentication Policies.
Policy Management
Manage authentication policies for your application. See Policy Management.
FIDO Registration
In this section you can see and manage registered FIDO Users.
User Management
Manage registered users and see information on their authentication history and access. See User Management.
Audit Trail
This section can be used to analyze user behavior and troubleshoot issues. See Audit Trail.
Workstation Settings
Manage Desktop MFA configuration. See Desktop MFA Settings.
Advanced Config
Access Tokens
Generate API Access Tokens in this section. This API token will be used to authenticate into the HYPR Server with HYPR APIs.
Push
In this section you can add Push Notification credentials. Please note that this is only needed for customers using the HYPR Mobile SDK.
FIDO FacetsID
In this section you can manage FIDO FacetsID. Please note that this is only needed if you are using the HYPR Mobile SDK.
UI Management
In this section you can manage the UI appearance of the mobile app to customize branding elements such as colors, company logo and support email.
IdP Management
Integrate with identity management providers (IdPs).
Extensions
Integrate with HYPR True Passwordless Extensions to extend the functionality of your authentication solutions. See Getting Started.
License Activation
In order to create more RP Applications, you must upload a valid license file. See License Key
SSL Pinning Configuration
Admins can upload certificates to enable SSL Pinning to enhance security. SSL Pinning can be enabled for mobile and desktop applications. Learn more about SSL Pinning in Workforce Access for Windows: Installation and Configuration.
Updated about 1 month ago