FAQs:
General
Can I use the SAFE-Key to authenticate to a website?
- YES, as long as that website allows 3rd Party SAML assertions for authentication or has the SAFE Technology server installed on an appliance on the enterprise.
When my computer “wakes up” from sleep mode, why doesn’t my SAFE-Key log me in?
As a security precaution, if you have left your SAFE-Key in your computer for an extended period of time and it has entered sleep mode, you must remove and re-insert the SAFE-Key, then enter the device username and password to allow desktop login.
Where do I find the user manual for the SAFE-Key Console?
- The User Manual and Quick Start Guide are automatically downloaded when you download SAFE Technology for the first time. Updates to the manuals and guides will be made available on the first Tuesday of every month when applicable.
Why would I want to digitally sign a file I encrypted?
- The SAFE-Key produces digital signatures in order to verify that a document both came from the claimed author and that it has not been altered. The device enforces password validation so the digital signature is also validated by a 2-factor scheme.
When I configure the desktop login my configuration is not saved. What do I do?
- In order for changes to be made and saved in the configuration, the user must select “Run as Administrator” in the SAFE-Key Widget. When the changes are completed, exit the application and run as the normal user.
How do I buy support for the SAFE-Key device?
- The first year of support is covered when the SAFE-Key is purchased. After the 1st year, a subscription fee of $60.00 per year is charged for updates to the software, the widget, and the key technology.
What country is the SAFE-Key Device manufactured?
- The SAFE-Key is manufactured only in the United States. All software has been developed by US citizens only.
How often do I update the SAFE-Key Console?
- Updates, if necessary, are scheduled for the first Tuesday of every month
How often do I update the firmware on the SAFE-Key device?
- Updates, if necessary, are scheduled for the first Tuesday of every month
I have a biometric login on my computer, why should I change to the SAFE-Key login?
- Biometrics are not secrets. You cannot change your biometrics (fingerprints, irises, etc.). Once your biometric is used as a login, it is in the cloud and cannot be recalled. A password is a secret and, if compromised, can be changed, strengthened, or used in conjunction with additional authentication.
Does SAFE Technology provide desktop login?
- YES. SAFE Technology provides desktop login for any deskside, desktop, laptop or tablet with a Standard USB 2 or higher port using either Windows (7 & up) or Apple OS X (10.8 & up).
- If there are further questions, or you require further technical information, please visit our website. We will be happy to answer any of your questions.
Is there a way to enforce SAFE Technology in the enterprise?
- If the use of SAFE-Key is mandatory for all login to the network and the servers, anyone attempting access will be unable to gain access to the network, servers, or accounts.
How easy is it to connect SAFE Technology to the enterprise?
- The SAFE Technology authentication server and protocol connect easily without any changes or interference to any existing network or single-sign-on (SSO) authorization system.
Do I have to change the way I login?
- NO. The user experience remains exactly the same; standard username and password. No one-time token provided authentication (numbers or passwords) or captcha phrases to enter unless they are a necessary part of the client’s current security requirements.
What makes SAFE Technology unique or different from other authentication solutions?
- Some of the features that are unique and make SAFE Technology more secure than other two-factor authentication solutions are:
- The user’s actual password is NOT VISIBLE in plain text during authentication: NOT on the desktop, NOT across the internet, NOT on the server, and NOT in the database.
- In the event of an attack on the database, the actual passwords CANNOT be viewed, compromised, or replayed.
- The authentication is digitally signed
- Other features can be found on our website.
Can I have multiple users on the SAFE-Key device?
- YES. It is possible to have multiple users and multiple domains associated with a single SAFE-Key. A family may use the same key among family members but have different usernames and passwords for authentication. Or, a single user may be able to login to several domains such as Dropbox for Business, Google Apps for Work and/or Salesforce with a single device.
What is an .SPF file?
- An .spf file is an extension like .pdf or .doc that is unique to SAFE Technology, used to identify documents and files that have been encrypted by the SAFE encryption engine. A file with the .spf extension can only be opened by a SAFE-Key and the users key password.
If my SAFE-Key is lost, stolen or damaged, how can I recover access to my data?
- Because the security of our customers is our number one concern, the SAFE-Key device has no “back-door” access. BiObex has created two methods to insure that a lost or stolen device can be recreated for access to encrypted information: Key Escrow Service and Crosskey. Both methods are designed to protect the user’s access and information.
- These are the only means to insure that a new device may be recreated in the event of a lost, stolen, or damaged SAFE-Key.
What is 2 Factor Authentication?
Two-Factor Authentication or 2FA describes an authentication requirement that the user provide something they have (a SAFE-Key, token or device) and something they know (a username and password).
What is a BiObex SAFE key device?
- A BiObex SAFE-Key is a small USB multi-function cyber security device. The device can be used for desktop logins on supported operating systems, encrypting and decrypting files, authentication to supported cloud services, and authentication for custom software.
- The SAFE-Key is a true 2 factor authentication device that increases the integrity of the password authentication method.
- The authentication experience for the user does not change and requires very little effort to use.
Safe Key
Can I use the SAFE-Key to authenticate to a website?
- YES, as long as that website allows 3rd Party SAML assertions for authentication or has the SAFE Technology server installed on an appliance on the enterprise.
When I configure the desktop login my configuration is not saved. What do I do?
- In order for changes to be made and saved in the configuration, the user must select “Run as Administrator” in the SAFE-Key Widget. When the changes are completed, exit the application and run as the normal user.