Protect PC and network with the chipcard

Log in securely to the PC with chipcard and password and access data

In order to unlock computers or access networks a simple password will often not provide sufficient protection.

If the user’s personal chipcard is also read at the PC in addi­tion to the typing in of the password, this will offer consider­able extra security. All you have to do is connect a smart card reader via USB or use an existing reader.

This means that it will not be possible to access confidential data without the physical possession of the chipcard.

Use existing chipcard

Anyone who already uses their chip card as an access card for rooms or as a payment card for the cafeteria or canteen will in future also receive access to networks and data with the same chip card: from any PC with individually defined rights.

Employee or service cards and student or membership cards are given a further function in the existing chip card system.

2-factor authentication:
Password and chipcard, app or USB token

Access to a network or sensitive data is only considered securely protected if other factors are requested in addition to the simple password. A second password carries the risk that users simply repeat, write down or even leave their passwords behind.

With the chipcard, the app, a USB token or biometric features, the authentication can be reliably secured with any number of factors without having to ask for additional passwords.

Beispielbild einer Zwei Faktor Authentifizierung per Chipkarte
Beispielbild für einer Zwei Faktor Authentifizierung per App
Beispielbild für USB-Token einer Zwei Faktor Authentifizierung

Take the same access rights with you to every workstation

Whoever has access to clearly defined data and systems at a workplace within an organisation can also use these rights with the same authentication at other workplaces. If you move to another terminal or workplace you can automati­cally take your access rights for data and systems with you.

The process can also be used at public terminals, where students can use a common system everywhere on campus, but can only access their personalized data.

This means that the user has the same access rights at every location on campus or in the organization – or not.

Single Sign-on

Single Sign-on

Only one registration for all data and programs

With Single Sign-on a single login on a personal computer will be sufficient to gain access to a wide range of data and servers at the same time, and without entering additional access data. In this way the user will only have to remember a single password.

Which data the user can view and which programs he can use and how is clearly regulated by the individually assigned access rights.

The high level of security also remains with single sign-on if this central access authorization to all data is securely protected by the 2-factor authentication with the chipcard.

Beispielbild für nur eine Anmeldung per SSO im Rahmen der Authentifizierung

Temporary transfer of permissions

Secure access to data and applications also means conversely security when assigning processes to people.

For example, whoever registers as a student for exams or a new semester at the university, or whoever uses systems and data as a doctor, can be reliably assigned.

In the event of liability cases or data leaks, the individual user can be precisely identified.

Beispielbild für die eindeutige Zuordnung von Systemnutzern im Rahmen der Authentifizierung

Clearly assign
system users

Central management of authorizations allows access to personal data and directories to be transferred without having to reveal passwords or share them.

For example, access authorization can be granted temporarily for vacation replacements and later be withdrawn.

Beispielbild für die zeitweise Übertragung im Rahmen der Authentifizierung

Your personal system consultants

The right contact for every topic and all regions. We look forward to receiving your inquiries.

HEAD OF SALES
SYSTEM CONSULTING NORTH

Volker Rüstig
+49 351 31558 241
ruestig@intrakey.de

IntraKey technologies AG
Im Nordfeld 5
29336 Nienhagen

+49 351 31558 – 241
+49 5144 6084938
 +49 173 3093514
ruestig@intrakey.de
Outlook-Kontakt

KEYACCOUNT MANAGEMENT
SYSTEM CONSULTING SOUTH-EAST

Sven Däberitz
+49 351 31558 0
daeberitz@intrakey.de

IntraKey technologies AG
Wiener Straße 114-116
01219 Dresden

+49 351 31558 – 0
+49 351 31558 – 129
daeberitz@intrakey.de
Outlook-Kontakt

KEYACCOUNT MANAGEMENT
HEAD OF PROJECT MANAGEMENT

Christina Angermann
+49 351 31558 0
angermann@intrakey.de

IntraKey technologies AG
Wiener Straße 114-116
01219 Dresden

+49 351 31558 – 0
+49 351 31558 – 129
angermann@intrakey.de
Outlook-Kontakt

SYSTEM CONSULTING MID-WEST

Thorsten Reichard
+49 351 31558 222
reichard@intrakey.de

IntraKey technologies AG
67744 Hohenöllen

+49 351 31558 – 222
+49 171 1936120
reichard@intrakey.de
Outlook-Kontakt

SYSTEM CONSULTING SOUTH-WEST

Andrea Kremann
+49 351 31558 212
kremann@intrakey.de

IntraKey technologies AG
Marienstraße 10
78054 Villingen-Schwenningen

+49 351 31558 – 212
+49 351 31558 – 129
kremann@intrakey.de
Outlook-Kontakt

SYSTEM CONSULTING ID-MANAGEMENT

Julia Schmitt
+49 7720 9945 45
schmitt@intrakey.de

IntraKey technologies AG
Marienstraße 10
78054 Villingen-Schwenningen

+49 7720 9945 – 45
+49 7720 9945 – 10
+49 173 3093519
schmitt@intrakey.de
Outlook-Kontakt