WebADM Self-Service and Help Desk

OpenOTP Self-Service & Help-Desk

End-user helper & time saver web apps

User Self-Service Desk

Website pw reset4
Lighten help-desk processes by letting users handle most of the self-management tasks.

RCDevs Security solutions are provided with end-user helper applications (called WebApps) which are optional components in WebADM.

These applications are part of your security infrastructure. They simplify many of your help-desk processes by letting the users handle most of the self-management tasks (i.e. token enrollment or account/password management).

Web Apps are companion portals for your RCDevs’ Web Service applications. For example, in some use-cases, OpenOTP requires the end-users to enroll, test or resynchronize their tokens.

For public use, Web Apps can easily be embedded in your website or deployed on the Internet using RCDevs’ WebADM Publishing Proxy Server.

The Self-Service Desk is designed for internal (corporate) use and includes several self-management features as:

Manage account information such as email, mobile phone numbers, etc..
Reset LDAP password according to a configurable password policy
Enroll, re-synchronize and test Software / Hardware Tokens or Yubikeys
Manage user certificates
Receive an automatic link to renew a Token, Password, Certificate or SSH Key when they expire
Secure Password Reset
This application allows users to set a new password on their LDAP account when they lost their current password or if it has expired. It uses the OpenOTP second login factor (SMS, Token or Yubikey) to authenticate the password reset operation. Alternatively, PKI authentication with user certificate can be used as authentication method to securely access the application. RCDevs Password Reset is compliant with any LDAP password including AD Domain passwords, UNIX passwords and even SAMBA accounts. You can define password complexity policies or let the application obey the existing AD password policy.
User Self-Registration
This application provides self-enrollment of Tokens and Yubikeys via a one-time email or SMS request, via the Administrator Portal, the Manager RPC Interface or even a batch script. You can send a self-enrollment link to a set of single users or members of LDAP groups. Users receive a message containing a URL via email or SMS. Clicking the link provides one-time access to the self-registration portal. Like in the Self-Service application, users can enroll and re-synchronize Tokens and test login operations.

Administration Help Desk

Website pw reset TB2

Delegate the 1st line of support

Administration Help-Desk is another optional component in WebADM.

This web application provides an easy-to-use interface for the first level of IT Support function.

This web application must be installed on your WebADM server(s) and can be accessed through WAProxy or another reverse proxy configured with WebADM.

The Administration Help Desk is designed for internal (corporate) use and includes several self-management features as:

Activate users for OpenOTP use
Enroll, re-synchronize and test Software / Hardware Tokens or Yubikeys
Manage account personal user informations
Reset LDAP password
Manage user certificates
Manage SSH keys (SpanKey)
Send password reset or token registration links
SSO Customization
Submit QRCode/PIN by Mail/SMS to End Users
User profil at a glance
With the easy-to-use dashboard, Support Teams get a summary of the User profile, so that at a glance Help-Desk Teams can view personal information, equipment, authentication methods and most recent activity.
OTP Authentication settings Management
Set the Primary OTP Method, Fallback OTP Method, challenge session timeout. Enable Push Login notifications. Test user authentication in real time during the whole process.
Token and Yubikey Management
Manage users hardware and software Tokens: register, remove, test or resynchronize user devices.
Reset User Password
Reset LDAP Password or send a dedicated link to the End User.
SSO Customization
Easily manage Single-Sign-On Settings: enable or disable SAML or OpenID usage and set the SSO Session Time.